what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

LSS-2005-06-06.txt

LSS-2005-06-06.txt
Posted Jun 18, 2005
Authored by Leon Juranic | Site security.lss.hr

LSS Security Advisory #LSS-2005-06-06 - Crob FTP server versions 3.6.1 and below suffer from various remote buffer overflows.

tags | advisory, remote, overflow
SHA-256 | c87f455adf3a1de29ab1bbd59e257815a8b6261cf9e1c2be3b87a1d648f5b816

LSS-2005-06-06.txt

Change Mirror Download
        LSS Security Advisory #LSS-2005-06-06
http://security.lss.hr




Title: Crob FTP Server remote buffer overflows
Advisory ID: LSS-2005-06-06
Date: 2005-06-01
Advisory URL: http://security.lss.hr/index.php?page=details&ID=LSS-2005-06-06
Impact: Remote code execution
Risk Level: High
Vulnerability Type: Remote
Vendors Status: 7th March, 2005



==[ Overview

Crob FTP Server is a powerful and flexible FTP Server with full user management
and network control for Windows 95/98/ME/2000/XP/2003. Crob FTP Server is using
the standard FTP (File Transfer Protocol) protocol an can be downloaded from
http://www.crob.net/en/.



==[ Vulnerability

There are various buffer overflows in Crob FTP server when processing client input.
First vulnerability is the stack overflow that can be triggered with a very long
parameter supplied to arbitrary FTP command (i.e. STOR) and calling RMD command
with long parameter afterwards. As a result, EIP is overflowed with user input.
Second vulnerability is the heap overflow vulnerability, probably in globbing
code, which can be triggered with characters like '?' or '*' followed by a long
string. This vulnerability can be triggered with commands like LIST or NLST.
Sucessful exploitation of these vulnerabilities will lead to remote code execution.



==[ Affected Version

Vulnerabilities were discovered in the latest Crob FTP server 3.6.1, but the
older versions might be also vulnerable.



==[ Fix

No fix available yet.



==[ PoC Exploit

Proof of concept code can be downloaded at http://security.lss.hr/PoC



==[ Credits

Credits for this vulnerability goes to Leon Juranic <ljuranic@lss.hr>.



==[ LSS Security Contact

LSS Security Team,

WWW : http://security.lss.hr
E-mail : security@LSS.hr
Tel : +385 1 6129 775

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    16 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close