exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

ipswitch2007.txt

ipswitch2007.txt
Posted Jan 14, 2007
Authored by sapheal

Ipswitch WS_FTP 2007 Professional suffers from an access violation vulnerability.

tags | advisory
SHA-256 | cd075200d73aecb7d60960711e1316a907ac76053d61b06e90b6a6eddc12b510

ipswitch2007.txt

Change Mirror Download
Synopsis: Ipswitch WS_FTP 2007 Professional "wsftpurl" access violation vulnerability
Product: Ipswitch WS_FTP 2007 Professional


Issue and details:
===========

The vulnerability was found in wsbho2k0.dll. Function Open ( String ) when given a long argument leads to memory corruption conditions. However, as the issue involves the control
that is not marked safe for scripting nor for initialization, it cannot be exploited remotely. Moreover, as for know I have not proved it is exploitable.


Unhandled exception at 0x7c840a81 in wsftpurl.exe: 0xC0000005: Access violation reading location 0x41414141.

In order to analyze the vulnerability one might execute wsftpurl.exe with a long argument.


When providing a specially crafted string:
"A buffer overrun has been detected which overrun program's internal state".


Additional information:
==============

As for now I am not aware of any exploits for this issue or even proofs that it is exploitable.


Kind regards,

Michal Bucko (sapheal)

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close