rFTPD buffer overflow.
bfe449e8e1caa0fd16987a659bab8eaf79b1b7a977bd4998bedf52ff58db5ec6
.:: Security Advisory ::.
by unl0ck team [http://unl0ck.host.kz]
_ _ ___ _ __ _ _
| | _ | _ _ |/ | |_ |__| |\/|
|__| | | | |_| |_ _|\_ | |_ | | | |
Advisory: #5 by unl0ck team
Bug: buffer overflow
Product: rftpd current version http://rave.swehack.se
Author: Werro [werro@list.ru] aka Darkeagle
Realease Date : 14/08/04
Risk: Low
Vendor status: Vendor is in a big shit :)
Reference: http://unl0ck.host.kz/advisories.php
Overview:
Do you know that many ftp daemons are released with NULL support?
rFTPD is not like that at all, your experience will build the software!
While you read this page, our team is writing the online manual for the server, to take away any doubts that may prevent you to use our program.
rFTPD offers:
Download at high speed
Fantastic logging
Unique signal handling
Restore your download after the client disconnection
Very easy configuration
Multiple languages are available such as English, dutch, norwegian, swedish, italian.
EPRT/EPASV full working
Details:
Bug was found in log.c file in va_printf() function. It is very lower bug :).
But it is bug :).
===================================================
char va_ret[512];
char *va_printf(char *message)
{
...
fs_zero (va_ret , sizeof(va_ret));
if ( message != NULL ) {
sprintf(va_ret ,"%d-%d-%d %02d:%02d:%02d: %s ",
1900 + tm_s->tm_year,
tm_s->tm_mon,
tm_s->tm_mday,
tm_s->tm_hour,
tm_s->tm_min,
tm_s->tm_sec,
message);
return (char *)va_ret;
...
===================================================
To avoid this bug use snprintf().
14/08/04.
(c) by unl0ck team.
http://unl0ck.host.kz