lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20041130022245.26354.qmail@www.securityfocus.com> Date: 30 Nov 2004 02:22:45 -0000 From: Hongzhen Zhou <felix__zhou@...mail.com> To: bugtraq@...urityfocus.com Subject: CuteFTP 6.0 Professional Remote Buffer Overflow Vulnerability Author: Hongzhen Zhou(Fortinet, Inc) <felix__zhou _at_ hotmail _dot_ com> DATE: 24/11/2004 PRODUCTS: CuteFTP Professional - FTP client for Windows. AFFECTED VERSION: Versions verified to be vulnerable: CuteFTP Professional 6.0 (latest verson) Other versions are not tested. DETAILS: When CuteFTP Professional process replies to many commands from a malicious FTP server, if the reply code is big than 500(4xx works sometimes) and the length of text following is big than 65530, the Cute FTP Professional will crash. Only some command's replies are not affected(like USER, PASS). It becomes even worse when the CuteFTP connects to server to wait for the welcome message reply, the malicious server could send such a reply to crash it. We are not sure if this bug could be exploited to let the attacker execute arbitrary code remotely.
Powered by blists - more mailing lists