lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  PHC 
Open Source and information security mailing list archives
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
From: epic at (Epic)
Subject: ProFtp bufferoverflow.


"The vulnerability is caused due to a boundary error in the ASCII file
transfer component when translating newline characters. This can be
exploited to cause a buffer overflow by uploading and then downloading a
specially crafted file." 


"The vulnerability is caused due to two off-by-one errors in the
"_xlate_ascii_write()" function. These can be exploited by sending a
specially crafted "RETR" FTP command with a 1023 bytes long argument
starting with a linefeed character."


I am not expert, and was wondering If this was actually something new in
the same ASCII File translation.?


-----Original Message-----
[] On Behalf Of Andreas
Sent: Thursday, March 04, 2004 11:34 AM
To: Frederic Charpentier;
Subject: Re: [Full-Disclosure] ProFtp bufferoverflow.

Frederic Charpentier <> wrote:

maybe the exploit is new - but the vuln is old.

> hi FD,
> do you guys knows something about the new proftpd exploit ?
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter:

Full-Disclosure - We believe in it.

Powered by blists - more mailing lists