[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <b95f0cba050824193364515201@mail.gmail.com>
Date: Thu Aug 25 12:48:43 2005
From: alacrity at gmail.com (Damien Palmer)
Subject: Re: LeapFTP .lsq Buffer Overflow Vulnerability
Seeing as how, given a large enough buffer, it is relatively easy to
write arbitrary shell code using just ASCII characters, the larger
unicode space would make this even easier. Unless there are some
pretty severe unlisted restrictions on either the length or content of
the overflow string, making an exploit is practically trivial.
If you want a quick'n'dirty overview of shell code using a very
limited subset of ASCII you can refer to the lecture notes from a unix
security class I took in Fall 2004 (starting on page 5 of this
document): http://cr.yp.to/2004-494/0910.pdf
-D
On 8/24/05, Kaveh Razavi <c0d3rz_team@...oo.com> wrote:
> it is not a high risk vulnerability .
> chance of making an stable exploit in a unicode
> overflow is low .
> Regards
>
> c0d3r of IHS
> Network Security Reseacher
>
> > LeapFTP .lsq Buffer Overflow Vulnerability
> >
> > by Sowhat
> >
> > Last Update:2005.08.24
> >
> > http://secway.org/advisory/AD20050824.txt
> >
> > Vendor:
> >
> > LeapWare Inc.
> >
> > Product Affected:
> >
> > LeapFTP < 2.7.6.612
> >
> > Overview:
> >
> > LeapFTP is the award-winning shareware FTP client
> > that combines an
> > intuitive interface with one of the most powerful
> > client bases around.
> >
> >
> > Details:
> >
> > .LSQ is the LeapFTP Site Queue file, And it is
> > registered with Windows
> > by LeapFTP. You can save a transfer Queue to .lsq
> > files and transfer it
> > later by opening the .lsq files.
> >
> > However, LeapFTP does not properly check the length
> > of the "Host" fields,
> > when a overly long string is supplied, there will be
> > a buffer overflow
> > and probably arbitrary code execution.
> >
> > This vulnerability can be exploited by sending the
> > malformed .lsq file
> > to the victim, after the victim open the .lsq file,
> > arbitray code may
> > executed.
> >
> >
> > //bof.lsq
> >
> > [HOSTINFO]
> > HOST=AAAAA...[ long string ]...AAAAA
> > USER=username
> > PASS=password
> >
> > [FILES]
> > "1","/winis/ApiList.zip","477,839","E:\ApiList.zip"
> >
> > SOLUTION:
> >
> > All users are encouraged to upgrade to 2.7.6
> > immediately
> > Vendor also released an advisory:
> > http://www.leapware.com/security/2005082301.txt
> >
> > Vendor Response:
> >
> > 2005.08.22 Vendor notified via online WebForm
> > 2005.08.23 Vendor responsed and bug fixed
> > 2005.08.24 Vendor released the new version 2.7.6.612
> > 2005.08.24 Advisory Released
> >
>
>
>
> ';" type="text/css">
>
>
> __________________________________________________
> Do You Yahoo!?
> Tired of spam? Yahoo! Mail has the best spam protection around
> http://mail.yahoo.com
>
Powered by blists - more mailing lists