Hi Support ,
I tried to run blat utility and I am getting , bellow output
cmd>blat.exe new1.baroc -f "akh@xyx.com -t "psin@xyx.com -
Blat v3.2.19 (build : Nov 18 2017 03:15:08)
64-bit Windows, Full, Unicode
No target email address or newsgroup was specified. You must give an email
address or usenet newsgroup to send messages to. Use -to, -cc, or -bcc option
for email, or -groups for usenet.
Aborting, nobody to send messages to.
Pinging 127.0.0.1 with 32 bytes of data:
Reply from 127.0.0.1: bytes=32 time<1ms TTL=128
Reply from 127.0.0.1: bytes=32 time<1ms TTL=128
Reply from 127.0.0.1: bytes=32 time<1ms TTL=128
Reply from 127.0.0.1: bytes=32 time<1ms TTL=128
At attacker would therefore be able to take complete control all servers used.
Is ther any workaround or updated blat is avaialble? please let me know .
Thanks
jprashant
I am confused. Are you trying to say that Blat is itself vulnerable to a hacker? I would like to point out that the source code for Blat is freely available.
Please explain how you went from the error message coming from Blat, to claiming that Blat is somehow vulnerable.
Chip
Hi Chip,
If you check below Output you can find the Reply from 127.0.0.1:
The output of the ping command (or any other command executed using this
method) is then visible
C:\Program Files\BMC Software\TrueSight\pw\server\bin>smail fn00018384 -f
pr567@xyz.com -t pr123@bmc.com -s "TEST" & ping 127.0.0.1 &rem TEST
-charset utf-8 -hdrencb
Blat v2.6.2 w/GSS encryption (build : Feb 25 2007 12:06:19)
Failed to open registry key for Blat
To set the SMTP server's name/address and your username/email address for
that
server machine do:
blat -install server_name your_email_address
or use '-server <server_name>' and '-f <your_email_address>'
aborting, nothing sent</your_email_address></server_name>
Pinging 127.0.0.1 with 32 bytes of data:
Reply from 127.0.0.1: bytes=32 time<1ms TTL=128
Reply from 127.0.0.1: bytes=32 time<1ms TTL=128
Reply from 127.0.0.1: bytes=32 time<1ms TTL=128
Reply from 127.0.0.1: bytes=32 time<1ms TTL=128
Ping statistics for 127.0.0.1:
Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 0ms, Maximum = 0ms, Average = 0ms
On Thu, Jan 24, 2019 at 8:10 AM Chip chipprogrammer@users.sourceforge.net
wrote:
Related
Support Requests: #52
Hi Chip,
If you check below Output you can find the Reply from 127.0.0.1:
The output of the ping command (or any other command executed using this method) is then visible
bin>smail fn00018384 -f pr567@xyz.com -t pr123@bmc.com -s "TEST" & ping 127.0.0.1 &rem TEST -charset utf-8 -hdrencb
Blat v2.6.2 w/GSS encryption (build : Feb 25 2007 12:06:19)
Failed to open registry key for Blat
To set the SMTP server's name/address and your username/email address for that
server machine do:
blat -install server_name your_email_address
or use '-server <server_name>' and '-f <your_email_address>'
aborting, nothing sent</your_email_address></server_name>
Pinging 127.0.0.1 with 32 bytes of data:
Reply from 127.0.0.1: bytes=32 time<1ms TTL=128
Reply from 127.0.0.1: bytes=32 time<1ms TTL=128
Reply from 127.0.0.1: bytes=32 time<1ms TTL=128
Reply from 127.0.0.1: bytes=32 time<1ms TTL=128
Ping statistics for 127.0.0.1:
Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 0ms, Maximum = 0ms, Average = 0ms
Last edit: jprashant 2019-01-24
IP address 127.0.0.1 is your own computer on which you are running Blat. Of course ping will get a response -- from your computer.
Blat stops processing the command line at the first ampersand (&), before the ping command. Everything after the ampersand is controlled by Windows' command processor CMD.EXE.
If you are concerned about a MITM attack that occurs within your own computer, you are way too late to do anything about it.
So far, you have not proven anything, least of all that Blat is somehow vulnerable to attack.
Chip
Thank you Chip for details you provided , I think this is good explaination on what we are expecting.
Thanks again
jprashant