what you don't know can hurt you


Posted Jul 28, 2005
Authored by ATmaCA, Kozan | Site spyinstructors.com

Remote exploitation of a buffer overflow vulnerability in Ares FileShare 1.1 could allow execution of arbitrary code.

tags | advisory, remote, overflow, arbitrary
MD5 | 9f8531c7ad4ee83dcb611769af317c7f


Change Mirror Download
Ares FileShare 1.1 'Long Searched String' Buffer Overflow Vulnerability


Ares Fileshare is one of the most popular P2P application around the world.
With Ares Fileshare you can connect to several established P2P-networks,
which will yield more search results with less effort. One of the beauties
with Ares Fileshare is that you don't have to share files in order to search
and download, in other words -- you'll be started within seconds.

More information can be found at the following link:


Remote and/or exploitation of a buffer overflow vulnerability in Ares FileShare
could allow execution of arbitrary code.

A specially crafted .conf file (ares.conf - configuration file of Ares FileShare)
containing long searched strings history information or entering a long string
for Search can cause Ares FileShare to overwrite stack space.

No checks are made on the length of data being copied, When a string data is longer
than 1065 bytes (1066 or longer), allowing the return address on the stack to be
overwritten (in UNICODE).


Successful exploitation allows remote and/or local attackers to execute arbitrary
code in the context of the target user that opened the malicious configuration file
or entering specially crafted search data.

After this when user starts Ares FileShare program and selects this malicious
entry from Search Listbox, buffer overflow occurs.

An example malicious ares.conf file is that contains long searc history data:

history = AAAAA.....[ A x 1065 bytes (where the EIP starts in UNICODE) ]AA...\r\n

The data that is written onto the stack is in the form: 0x00410041

41s in hexadecimal = 'A's are controlled by the input. While this
tends to make exploitation more difficult, it does not prevent it, as it
may be possible for an attacker to cause controlled data to be put into
a memory location matching the required format.


Ares FileShare 1.1 is vulnerable. Earlier versions strongly might be
vulnerable to this issue.


User awareness is the best method of defense against this class of
attack. Users must be wary when opening files from untrusted sources.

When possible, run client software, as regular user accounts with
limited access to system resources. This may limit the immediate
consequences of client-side vulnerabilities.

Discovered by Kozan
Credits to ATmaCA
Web: www.spyinstructors.com
Mail: kozan@spyinstructors.com
Login or Register to add favorites

File Archive:

January 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jan 1st
    4 Files
  • 2
    Jan 2nd
    3 Files
  • 3
    Jan 3rd
    3 Files
  • 4
    Jan 4th
    33 Files
  • 5
    Jan 5th
    31 Files
  • 6
    Jan 6th
    21 Files
  • 7
    Jan 7th
    15 Files
  • 8
    Jan 8th
    19 Files
  • 9
    Jan 9th
    1 Files
  • 10
    Jan 10th
    1 Files
  • 11
    Jan 11th
    33 Files
  • 12
    Jan 12th
    19 Files
  • 13
    Jan 13th
    27 Files
  • 14
    Jan 14th
    8 Files
  • 15
    Jan 15th
    16 Files
  • 16
    Jan 16th
    1 Files
  • 17
    Jan 17th
    2 Files
  • 18
    Jan 18th
    20 Files
  • 19
    Jan 19th
    32 Files
  • 20
    Jan 20th
    15 Files
  • 21
    Jan 21st
    10 Files
  • 22
    Jan 22nd
    16 Files
  • 23
    Jan 23rd
    0 Files
  • 24
    Jan 24th
    0 Files
  • 25
    Jan 25th
    0 Files
  • 26
    Jan 26th
    0 Files
  • 27
    Jan 27th
    0 Files
  • 28
    Jan 28th
    0 Files
  • 29
    Jan 29th
    0 Files
  • 30
    Jan 30th
    0 Files
  • 31
    Jan 31st
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2020 Packet Storm. All rights reserved.

Security Services
Hosting By