Title:

	"Remote Denial of service against Microsoft ActiveSynch
	Service 3.1" (Official Advisory 2001-01)

Severity:

	Low.

So, what is activesynch?

	- Activesynch is a data synchronisation program for
	WindowsCE devices (i.e. PocketPC)


Affected Systems?

	- Any system running/interfacing with Activesynch 3.1.

Impact?

	Communications disruption, untill restart of program.

	- Activesynch program crashes due to improper string
	parsing. Any data up to and including 7 bytes are
	sucessfully processed (i.e. typing), but 8 bytes and
	above crashes the app. Even remote attack is possible
	since it listens on all interfaces (Why?)

	(Is it so hard to get a fixed number of bytes from a
	 socket and discard the rest? Apparently...)

Exploit?

	1. Copy 8 (any) characters to the clipboard i.e. "GARBAGE!"
	2. Start telnet.exe, connect to port 5679
	3. PASTE text using the menu in telnet (Edit/Paste)
	4. Now, try to reconnect.
	5. [Bzzzzzzzp!] Wont work!

	...or use the proof of concept tool here.

Solution?

	For now: Just exit windows (logout) and login again and it
	will resume serving.

	Ask MS for a fix, i didn't notify them, it's not a critical
	piece of software.

Status?

	Well, it's not fixed right now, it's not the end of the world,
	since Activesynch isn't THAT widely used + the system remains
	unaffected + it's only serving one user at a time.

Time?
	Research: 30 min, Writeup: 30 min == 1 hour.

(To Microsoft: Please rename "your" Urlscan to something else. How would
 you feel if i wrote a firewall and named it ISA Server?)

(C) 2001 Ichinin{at}suespammers{dot}org - May be redistributed if unaltered.




1