what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

wftpdBO.txt

wftpdBO.txt
Posted Feb 29, 2004
Authored by Axl

WFTPD server versions 3.1 through 3.21 and Pro server versions 3.2x have a stack based buffer overflow vulnerability that a remote attacker can exploit to execute arbitrary code. The daemon runs with SYSTEM privileges under Pro server releases and it runs under the user ID that spawn the process under regular server releases.

tags | advisory, remote, overflow, arbitrary
SHA-256 | d96604be4ee3e2c5998b797791156e6d9f79c002f026168f787de6bf9ca7720b

wftpdBO.txt

Change Mirror Download
Name of Advisory: Critical WFTPD buffer overflow vulnerability
Severity: Critical
Discoverer: axl (rdxaxl@hotmail.com)
Released: Today
Vendor Notified: Today

WFTPD who? what? when?
~~~~~~~~~~~~~~~~~~~~~~
Vendor quote: "WFTPD Server has been a leading FTP server for Windows since
it was released in 1993. Its stability and security have long been relied
on by technology companies, educational institutions, government
departments, individuals and others, to provide a secure FTP site."

Tested versions
~~~~~~~~~~~~~~~
- WFTPD Pro Server 3.21 Release 1 (trial) (latest version)
- WFTPD Pro Server 3.20 Release 2 (trial)
- WFTPD Server 3.21 Release 1 (trial) (latest version)
- WFTPD Server 3.10 Release 1 (trial)

All tested versions are vulnerable. Other versions may also be vulnerable.

Overview
~~~~~~~~
There's a stack based buffer overflow vulnerability that a remote attacker
can exploit to execute arbitrary code on the remote system running the
vulnerable WFTPD server software. For WFTPD Pro Server, the code will
execute as SYSTEM, and for WFTPD Server, the code will execute as the user
who started the server.

Vulnerability details
~~~~~~~~~~~~~~~~~~~~~
The vulnerable FTP commands are LIST, NLST, and STAT. The user must be
logged in as any user unless the Secure option in the registry is 0.

There's special code to check if the first argument's first character is
equal to '-'. If it is, and there's a ' ' character at some later position,
we'll execute this vulnerable code (WFTPD Pro trial v3.21.1.1). For the
programming challenged people, I've added comments:

004034B8 MOV EAX,[EBP+8] ; strchr(userbuf, ' ')
004034BB SUB EAX,ESI
004034BD DEC EAX ; num bytes to copy
004034BE CMP EAX,EDI ; (below) jump if num bytes to copy
004034C0 JLE SHORT 004034C4 ; is <= max_len - 2
004034C2 MOV EDI,EAX
004034C4 PUSH EDI ; max(max_len - 2, num bytes to copy)
004034C5 INC ESI ; don't copy '-'
004034C6 PUSH ESI ; &userbuf[1]
004034C7 PUSH EBX ; &dest[1] on the stack
004034C8 CALL memcpy

Anything between the first '-' char to the first ' ' char can be copied to
the string. This string only has room for 31 characters and a terminating
null byte. Obviously, the programmer mistakenly used max() instead of min().

Exploit
~~~~~~~
See attached source code.

_________________________________________________________________
Store more e-mails with MSN Hotmail Extra Storage – 4 plans to choose from!
http://click.atdmt.com/AVE/go/onm00200362ave/direct/01/

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close