Menu

#52 blat.exe vulnerable

v1.0 (example)
open
3
2019-01-25
2019-01-22
jprashant
No

Hi Support ,

I tried to run blat utility and I am getting , bellow output

cmd>blat.exe new1.baroc -f "akh@xyx.com -t "psin@xyx.com -
Blat v3.2.19 (build : Nov 18 2017 03:15:08)
64-bit Windows, Full, Unicode

No target email address or newsgroup was specified. You must give an email
address or usenet newsgroup to send messages to. Use -to, -cc, or -bcc option
for email, or -groups for usenet.
Aborting, nobody to send messages to.

Pinging 127.0.0.1 with 32 bytes of data:
Reply from 127.0.0.1: bytes=32 time<1ms TTL=128
Reply from 127.0.0.1: bytes=32 time<1ms TTL=128
Reply from 127.0.0.1: bytes=32 time<1ms TTL=128
Reply from 127.0.0.1: bytes=32 time<1ms TTL=128

At attacker would therefore be able to take complete control all servers used.

Is ther any workaround or updated blat is avaialble? please let me know .

Thanks
jprashant

Related

Support Requests: #52

Discussion

  • Chip

    Chip - 2019-01-24

    I am confused. Are you trying to say that Blat is itself vulnerable to a hacker? I would like to point out that the source code for Blat is freely available.

    Please explain how you went from the error message coming from Blat, to claiming that Blat is somehow vulnerable.

    Chip

     
    • jprashant

      jprashant - 2019-01-24

      Hi Chip,

      If you check below Output you can find the Reply from 127.0.0.1:
      The output of the ping command (or any other command executed using this
      method) is then visible

      C:\Program Files\BMC Software\TrueSight\pw\server\bin>smail fn00018384 -f
      pr567@xyz.com -t pr123@bmc.com -s "TEST" & ping 127.0.0.1 &rem TEST
      -charset utf-8 -hdrencb
      Blat v2.6.2 w/GSS encryption (build : Feb 25 2007 12:06:19)

      Failed to open registry key for Blat
      To set the SMTP server's name/address and your username/email address for
      that
      server machine do:
      blat -install server_name your_email_address
      or use '-server <server_name>' and '-f <your_email_address>'
      aborting, nothing sent</your_email_address></server_name>

      Pinging 127.0.0.1 with 32 bytes of data:
      Reply from 127.0.0.1: bytes=32 time<1ms TTL=128
      Reply from 127.0.0.1: bytes=32 time<1ms TTL=128
      Reply from 127.0.0.1: bytes=32 time<1ms TTL=128
      Reply from 127.0.0.1: bytes=32 time<1ms TTL=128

      Ping statistics for 127.0.0.1:
      Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
      Approximate round trip times in milli-seconds:
      Minimum = 0ms, Maximum = 0ms, Average = 0ms

      On Thu, Jan 24, 2019 at 8:10 AM Chip chipprogrammer@users.sourceforge.net
      wrote:

      I am confused. Are you trying to say that Blat is itself vulnerable to a
      hacker? I would like to point out that the source code for Blat is freely
      available.

      Please explain how you went from the error message coming from Blat, to
      claiming that Blat is somehow vulnerable.

      Chip

      Status: open
      Group: v1.0 (example)
      Labels: blat.exe vulnerability
      Created: Tue Jan 22, 2019 03:24 PM UTC by Prashant Joshi
      Last Updated: Tue Jan 22, 2019 03:24 PM UTC
      Owner: Blat Manager (Tim)

      Hi Support ,

      I tried to run blat utility and I am getting , bellow output

      cmd>blat.exe new1.baroc -f "akh@xyx.com -t "psin@xyx.com -
      Blat v3.2.19 (build : Nov 18 2017 03:15:08)
      64-bit Windows, Full, Unicode

      No target email address or newsgroup was specified. You must give an email
      address or usenet newsgroup to send messages to. Use -to, -cc, or -bcc
      option
      for email, or -groups for usenet.
      Aborting, nobody to send messages to.

      Pinging 127.0.0.1 with 32 bytes of data:
      Reply from 127.0.0.1: bytes=32 time<1ms TTL=128
      Reply from 127.0.0.1: bytes=32 time<1ms TTL=128
      Reply from 127.0.0.1: bytes=32 time<1ms TTL=128
      Reply from 127.0.0.1: bytes=32 time<1ms TTL=128

      At attacker would therefore be able to take complete control all servers
      used.

      Is ther any workaround or updated blat is avaialble? please let me know .

      Thanks
      jprashant


      Sent from sourceforge.net because you indicated interest in
      https://sourceforge.net/p/blat/support-requests/52/

      To unsubscribe from further messages, please visit
      https://sourceforge.net/auth/subscriptions/

       

      Related

      Support Requests: #52

  • jprashant

    jprashant - 2019-01-24

    Hi Chip,

    If you check below Output you can find the Reply from 127.0.0.1:
    The output of the ping command (or any other command executed using this method) is then visible

    bin>smail fn00018384 -f pr567@xyz.com -t pr123@bmc.com -s "TEST" & ping 127.0.0.1 &rem TEST -charset utf-8 -hdrencb
    Blat v2.6.2 w/GSS encryption (build : Feb 25 2007 12:06:19)

    Failed to open registry key for Blat
    To set the SMTP server's name/address and your username/email address for that
    server machine do:
    blat -install server_name your_email_address
    or use '-server <server_name>' and '-f <your_email_address>'
    aborting, nothing sent</your_email_address></server_name>

    Pinging 127.0.0.1 with 32 bytes of data:
    Reply from 127.0.0.1: bytes=32 time<1ms TTL=128
    Reply from 127.0.0.1: bytes=32 time<1ms TTL=128
    Reply from 127.0.0.1: bytes=32 time<1ms TTL=128
    Reply from 127.0.0.1: bytes=32 time<1ms TTL=128

    Ping statistics for 127.0.0.1:
    Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
    Approximate round trip times in milli-seconds:
    Minimum = 0ms, Maximum = 0ms, Average = 0ms

     

    Last edit: jprashant 2019-01-24
  • Chip

    Chip - 2019-01-25

    IP address 127.0.0.1 is your own computer on which you are running Blat. Of course ping will get a response -- from your computer.

    Blat stops processing the command line at the first ampersand (&), before the ping command. Everything after the ampersand is controlled by Windows' command processor CMD.EXE.

    If you are concerned about a MITM attack that occurs within your own computer, you are way too late to do anything about it.

    So far, you have not proven anything, least of all that Blat is somehow vulnerable to attack.

    Chip

     
  • jprashant

    jprashant - 2019-01-25

    Thank you Chip for details you provided , I think this is good explaination on what we are expecting.

    Thanks again
    jprashant

     

Log in to post a comment.

Want the latest updates on software, tech news, and AI?
Get latest updates about software, tech news, and AI from SourceForge directly in your inbox once a month.