The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


[NT] BlackJumboDog FTP Server Buffer Overflow


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
Date: 1 Aug 2004 15:20:52 +0200
From: SecuriTeam <[email protected]>
To: [email protected]
Subject: [NT] BlackJumboDog FTP Server Buffer Overflow

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html 

- - - - - - - - -



  BlackJumboDog FTP Server Buffer Overflow
------------------------------------------------------------------------


SUMMARY

SapporoWorks BlackJumboDog is an integrated open-source proxy server, web 
server and FTP server developed by SapporoWorks for Microsoft Windows 
platforms.

BlackJumboDog version 3.6.1 is vulnerable to a buffer overflow in its FTP 
server.

DETAILS

Vulnerable Systems:
 * BlackJumboDog version 3.6.1

Immune Systems:
 * BlackJumboDog version 3.6.2

Impact:
By sending a specially crafted FTP request containing a long parameter 
string in the USER, PASS, RETR, CWD, XMKD, XRMD or various other commands, 
a remote attacker could cause a stack overflow and execute arbitrary code.

Technical Details:
This vulnerability is caused by an unsafe strcpy() that copies the entire 
parameter of the user's FTP command to a stack buffer of 256 bytes. For 
example, suppose that the user's FTP client issues the following command.
USER xxxxxxxxxxxx

The command parameter "xxxxxxxxxxxx" will be copied to a 256 bytes buffer 
using strcpy(). Hence, by crafting an FTP command with an overly long 
parameter, a remote attacker could trigger a stack overflow and execute 
arbitrary code. The attacker do not need to have a valid account on the 
FTP server since the overflow can be triggered prior to authentication 
using the USER command.

Vendor Status:
The author has fixed the bug in version 3.6.2. Users are advised to 
upgrade to the fixed version.


ADDITIONAL INFORMATION

The information has been provided by  <mailto:[email protected]> 
Chew Keong TAN.




This bulletin is sent to members of the SecuriTeam mailing list. To unsubscribe from the list, send mail with an empty subject line and body to: [email protected] In order to subscribe to the mailing list, simply forward this email to: [email protected]

DISCLAIMER: The information in this bulletin is provided "AS IS" without warranty of any kind. In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.

<< Previous INDEX Search src Set bookmark Go to bookmark Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2025 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру