exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

VIGILANTE-2000006.txt

VIGILANTE-2000006.txt
Posted Aug 15, 2000
Authored by Vigilante | Site vigilante.com

Vigilante Security Advisory - The OS/2 Warp 4.5 FTP Server contains denial of service vulnerabilities which allow anyone who can connect to port 21 to crash the service. Fix available here.

tags | exploit, denial of service, vulnerability
SHA-256 | dcb764dd372fa94bea264f25decd609cbc3da5a3d482b1c028224a0dfc38159b

VIGILANTE-2000006.txt

Change Mirror Download
OS/2 Warp 4.5 FTP Server DoS

Advisory Code: VIGILANTE-2000006

Release Date:
August 15, 2000

Systems Affected:
- OS/2 Warp 4.5 FTP server V4.0/4.2
- OS/2 Warp 4.5 FTP server V4.3
- Probably other versions of the software as well.

THE PROBLEM
The FTP server that comes with OS/2 Warp 4.5 TCP/IP can be brought down by a
malicious connection attempt.

Vendor Status:
The vendor has released the patch for the problem and it contains
the following explanation of the problem: "Sending username/password
followed immediately by up to 1k of data when connecting to FTP via Telnet,
can cause a trap. ".
During testing we found that an initial connection attempt (using sockets,
telnet, ftp) using an invalid username/password combination, followed by a
second attempt, where the userfield was exceptionally long (256 bytes) would
crash the service.

Fix:
In case you are using a version prior to 4.3, please contact IBM support for
further assistance.
If you are using v4.3, you can get the patch at the following URL:
ftp://ftp.software.ibm.com/ps/products/tcpip/fixes/v4.3os2/ic27721/

Vendor URL: http://www.ibm.com
Product URL: http://www.ibm.com/software/os/warp/

Copyright VIGILANTe 2000-08-15

Disclaimer:
The information within this document may change without notice. Use of
this information constitutes acceptance for use in an AS IS
condition. There are NO warranties with regard to this information.
In no event shall the author be liable for any consequences whatsoever
arising out of or in connection with the use or spread of this
information. Any use of this information lays within the user's
responsibility.

Feedback:
Please send suggestions, updates, and comments to:

VIGILANTe
mailto: info@vigilante.com
http://www.vigilante.com



Login or Register to add favorites

File Archive:

October 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    39 Files
  • 2
    Oct 2nd
    23 Files
  • 3
    Oct 3rd
    18 Files
  • 4
    Oct 4th
    20 Files
  • 5
    Oct 5th
    0 Files
  • 6
    Oct 6th
    0 Files
  • 7
    Oct 7th
    17 Files
  • 8
    Oct 8th
    66 Files
  • 9
    Oct 9th
    25 Files
  • 10
    Oct 10th
    0 Files
  • 11
    Oct 11th
    0 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    0 Files
  • 15
    Oct 15th
    0 Files
  • 16
    Oct 16th
    0 Files
  • 17
    Oct 17th
    0 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close