[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <twig.1124286275.19578@autistici.org>
Date: Wed, 17 Aug 2005 13:44:35 -0000
From: "Donato Ferrante" <fdonato@...istici.org>
To: <bugtraq@...urityfocus.com>, <vuln@...unia.com>,
<full-disclosure@...ts.grok.org.uk>, <bugs@...uritytracker.com>,
<news@...uriteam.com>
Subject: Unicode Buffer Overflow in WinFtp Server 1.6.8
Donato Ferrante
Application: WinFtp Server
http://www.wftpserver.com
Version: 1.6.8
Bug: Unicode Buffer Overflow
Date: 17-Aug-2005
Author: Donato Ferrante
e-mail: fdonato@...istici.org
web: www.autistici.org/fdonato
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
1. Description
2. The bug
3. The code
4. The fix
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
----------------
1. Description:
----------------
Vendor's Description:
"WinFTP Server is a multithreaded FTP server for Windows 98/NT/XP."
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
------------
2. The bug:
------------
The bug is located in the "Log To Screen" feature, this feature
allows the program to show server's log on screen.
By default the program has this function (called Log-SCR) enabled.
So a malicious user can trigger an unicode buffer overflow.
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
-------------
3. The code:
-------------
To test the vulnerability send a request to the FTP server like:
aaa [1024 of a] aaa
and then scroll down the log screen, so the server will crash.
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
------------
4. The fix:
------------
Vendor has been contacted.
Bug will be fixed in the next release.
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists