lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  PHC 
Open Source and information security mailing list archives
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Date: Thu, 26 Feb 2004 23:13:00 +0800
From: "bkbll" <>
To: "bugtraq" <>
Cc: "vulnwatch" <>,
   "full-disclosure" <>
Subject: [VulnWatch] [vulnwatch] Serv-U MDTM Command Buffer Overflow Vulnerability

[vulnwatch] Serv-U MDTM Command Buffer Overflow Vulnerability

                             Security Advisory

   Advisory Name: Serv-U MDTM Command Buffer Overflow Vulnerability
    Release Date: 02/26/2004
Affected version: Serv-U <
          Author: bkbll <>

    The Serv-U is a ftp daemon runs on windows. Serv-U supports a ftp command "MDTM" for user changing 
file time . There is a  buffer overflow when a user logged in and send a malformed time zone as MDTM argument.
This can be remote exploit and gain SYSTEM privilege.


    When a user logged in, he can send this 
    You must have a valid user account and password to exploit it, and you are not need WRITE or any other privilege.
And even the test.txt,which is the file you request, can not be there. :) 
    So you can put your shellcode as the filename.

About HUC:

     HUC is still alive.
[ bkbll]#date +"%%F %%T"
[ bkbll]#2004-02-26 23:11:36

Full-Disclosure - We believe in it.

Powered by blists - more mailing lists