SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (File Transfer/Sharing)  >   FTPServer/X Vendors:   Mabry Software
Mabry FTPServer/X Buffer Overflows in Several FTP Commands Let Remote Users Crash the Server
SecurityTracker Alert ID:  1007177
SecurityTracker URL:  http://securitytracker.com/id/1007177
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Jul 13 2003
Impact:   Denial of service via network
Exploit Included:  Yes  
Version(s): 1.00.047
Description:   Several buffer overflow vulnerabilities were reported in the Mabry FTPServer/X FTP daemon. A remote user can cause the target FTP server to crash.

dr_insane reported that a remote authenticated user (including an anonymous user, if permitted) can send a certain number of characters with the CWD, STAT, MKD, LIST, and RMD commands to trigger an overflow and crash the server.

Impact:   A remote user can cause the FTP server to crash.
Solution:   No solution was available at the time of this entry.
Vendor URL:  www.mabry.com/ftpserv/index.htm (Links to External Site)
Cause:   Boundary error
Underlying OS:  Windows (Any)

Message History:   None.


 Source Message Contents

Subject:  [0day] dr_insane||MABRY ftp daemon 1.00.047 D0S


-
==============================================================================
               MABRY ftp daemon 1.00.047 Security Advisory


                 If you have any suggestions or comments   
             please send me e-mail: dr_insane@pathfinder.gr  
 ==============================================================================

 Published:  July 7, 2003
 Revision:   1.0


  Severity:
 ----------
 High (Crash FTP server remotely)


  1.Summary:
 ------------
MABRY Ftpd is a simple Ftp.Some buffer overflow conditions found that allow
someone to crash the server or even execute arbitary code.The problem
exists with the CWD,STAT,MKD,LIST and RMD commands.By sending 3200 characters next
to these commands the server will crash.Let's see...

CWD * 280

buffer overflow...crash...
LIST * 280
buffer overflow...crash...

MKD * 280

buffer overflow...crash...

RMD * 280

buffer overflow...crash...

STAT * 280

buffer overflow...crash...


Temporary solution
------------------
nuthin..update to the next version when it's out.



Disclaimer
---------
The author(s) does(do) not have any responsibility for any malicious
use of this advisory or proof of concept code. The code and the
information provided here are for educational purposes only.
The author(s) will NOT be held responsible for any direct or 
indirect damages caused by the information or the code
provided here.

----------------------------
Dr_Insane
members.lycos.co.uk/r34ct/
----------------------------

______________________________________________________________________________________
http://mobile.pathfinder.gr - Pathfinder Mobile logos & Ringtones! 

_______________________________________________
0day mailing list
0day@nothackers.org
http://nothackers.org/mailman/listinfo/0day

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC