[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <200703160136.l2G1aCQ5015461@turing-police.cc.vt.edu>
Date: Thu, 15 Mar 2007 21:36:12 -0400
From: Valdis.Kletnieks@...edu
To: Knud Erik Højgaard <kokanin@...il.com>
Cc: listgrok <full-disclosure@...ts.grok.org.uk>
Subject: Re: QFTP (LIBFtp 3.1-1) (command line) sprintf()
local buffer overflow
On Thu, 15 Mar 2007 21:12:50 BST, =?ISO-8859-1?Q?Knud_Erik_H=F8jgaard?= said:
> On 3/15/07, starcadi starcadi <starcadi@...il.com> wrote:
>
> > >> POC
> yes, piece of crap. Who cares about local overflows in non-suid applications?
It can be interesting if you can find a way to get some *other* user to
run the application - so if you can find a web server that has a CGI that
invokes QFTP (or whatever) with attacker-controlled parameters, you can use
that to pwn the webserver. Basically, you need to be able to leverage the
distinction between "yourself" and "the userid executing the program".
Content of type "application/pgp-signature" skipped
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists