what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

11.04.02a.txt

11.04.02a.txt
Posted Nov 13, 2002
Authored by David Endler, Texonet | Site idefense.com

iDEFENSE Security Advisory 11.04.02a - Pablo Software Solutions' FTP Server v1.5 and below is a multi-threaded FTP server for Windows 98, NT 4.0, 2000 and XP that contains a remotely exploitable buffer overflow vulnerability. Fix available here.

tags | overflow
systems | windows
SHA-256 | baa01c7e8344ba2565fc81e13b9f3b233aad068c7e8e6a3fb844674096cd92e8

11.04.02a.txt

Change Mirror Download
iDEFENSE Security Advisory 11.04.02a: 
http://www.idefense.com/advisory/11.04.02a.txt
Pablo FTP Server DoS Vulnerability
November 4, 2002

I. BACKGROUND

Pablo Software Solutions' FTP Server is a multi-threaded FTP server for
Windows 98, NT 4.0, 2000 and XP. More information about it is available at
http://www.pablovandermeer.nl/ftp_server.html.

II. DESCRIPTION

Because of its incorrect handling of format string markers in user-provided
input, the FTP Server can be remotely crashed if it attempts to process such
malformed input; code execution is also a possibility. The denial of service
condition is exploited by attempting to login to the target FTP server as '%n'.

III. ANALYSIS

Successful exploitation should crash the FTP server. What is most damaging
about this is that the files and resources readily made available by the
server's proper functionality are inaccessible for the duration that the server
is attacked. While no exploit currently exists, it is possible to execute
arbitrary code.

IV. DETECTION

Pablo FTP Server 1.3 and 1.5, running on Windows 2000; version 1.2 is
reportedly vulnerable as well. Connecting to an arbitrary Pablo FTP Server
and providing a username of "%x%x%x%x" can determine susceptibility.
The server is vulnerable if an entry such as the following is found in the
produced log files:

[1064] 530 Please login with USER and PASS
[1064] USER f7db018409be31
[1064] 331 Password required for 247db018409be32

The username values that show up in the log files are pulled from memory
(the stack) and should differ from system to system.

V. WORKAROUND

Use a filtering proxy server to help mitigate the attack by blocking requests
that contain format string markers.

VI. VENDOR FIX

Version 1.51, which fixes the problem, is available at
http://www.pablovandermeer.nl/ftpserver.zip.

VII. CVE INFORMATION

The Mitre Corp.'s Common Vulnerabilities and Exposures (CVE) Project
assigned the identification number CAN-2002-1244 to this issue.

VIII. DISCLOSURE TIMELINE

10/15/2002 Issue disclosed to iDEFENSE
10/31/2002 Author notified
10/31/2002 iDEFENSE clients notified
11/01/2002 Response received from pablovandermeer@kabelfoon.nl
11/04/2002 Coordinated Public disclosure

IX. CREDIT

Texonet (http://www.texonet.com) discovered this vulnerability.
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    0 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close