lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <546598114.20090908124640@Zoller.lu>
Date: Tue, 8 Sep 2009 12:46:40 +0200
From: Thierry Zoller <Thierry@...ler.lu>
To: Kingcope <kcope2@...glemail.com>
Cc: full-disclosure@...ts.grok.org.uk, bugtraq@...urityfocus.com
Subject: Re: Microsoft Internet Information Server ftpd
	zeroday

Hi Kingcope,

Thanks to a hint by "Petar" on the G-SEC blog [1] it  appears
that the  very same bug was present in IIS3 and IIS4 and discovered
by eeye in 1999 :
http://research.eeye.com/html/advisories/published/AD19990124.html

"Microsoft  IIS  (Internet  Information Server) FTP service contains a
buffer overflow in the NLST command. This could be used to DoS a remote
machine and in some cases execute code remotely."

Is this the same bug andwas the bug re-introduced ? Has Microsoft
fixed  LS  but  not NLST?  "svn" mishap ?

Maybe Mudge and/or Dildog can comment - would certainly be interesting
to know whether and if HOW this bug was reintroduced.

[1] http://blog.g-sec.lu/2009/09/iis-5-iis-6-ftp-vulnerability.html

Regards,
Thierry ZOLLER

--
http://blog.zoller.lu



_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ