The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


[NT] ArGoSoft FTP Server Reveals Valid Usernames and Allows Brute Forcing Attacks


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
Date: 3 Jan 2005 16:57:18 +0200
From: SecuriTeam <support@securiteam.com.>
To: [email protected]
Subject: [NT] ArGoSoft FTP Server Reveals Valid Usernames and Allows Brute Forcing Attacks

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html 

- - - - - - - - -




  ArGoSoft FTP Server Reveals Valid Usernames and Allows Brute Forcing 
Attacks
------------------------------------------------------------------------


SUMMARY

 <http://www.argosoft.com/ftpserver/>; ArGoSoft FTP Server is "a 
lightweight FTP Server for Microsoft Windows platforms". Two 
vulnerabilities exist in ArGoSoft, one allows enumerating the existing 
user database of the FTP program, the other allows executing a brute force 
attack without the server executing any type of defense against it.

DETAILS

Username disclosure:
Versions prior to 1.4.2.1 will disclose whether or not a supplied username 
is valid or not. A login name supplied with the USER command will not be 
accepted unless it is valid. If the username is invalid it will return a 
message similar to:
530 User NAME_HERE does not exist

otherwise it will accept the username and ask for the password. Version 
1.4.2.1 and beyond have fixed this problem and will ask for a password 
regardless of whether or not the username actually exists. The vendor was 
quick to fix this and released a new version relatively shortly after the 
issue was reported.

Brute Force:
However, another issue is still at large with ArGOSoft's FTP Server. This 
issue exists in the current version (1.4.2.4) and in previous versions. 
ArGoSoft FTP Server does not have a limit to the number of tries that can 
be entered for a username/password combination before it terminates the 
connection. It will allow and unlimited number of login attempts. This 
issue in conjunction with the previously mentioned one would not only 
allow for brute force password cracking of a known username, but for a 
quick brute force attack to find valid usernames. It might also be worth 
mentioning that there also does not appear to be any type of login timeout 
for the login process. This issue was also reported to the vendor at the 
same time as username problem.

Solutions:
Upgrade to the latest version at the ArGoSoft website. As for the brute 
force issue, perhaps that will be fixed in the future. Just make your 
passwords difficult, keep your login name(s) secure, and turn on logging 
and monitor it.


ADDITIONAL INFORMATION

The information has been provided by  <mailto:steven@lovebug.org.> steven.
The original article can be found at:  
<http://www.lovebug.org/argosoft_advisory.txt>; 
http://www.lovebug.org/argosoft_advisory.txt




This bulletin is sent to members of the SecuriTeam mailing list. To unsubscribe from the list, send mail with an empty subject line and body to: [email protected] In order to subscribe to the mailing list, simply forward this email to: [email protected]

DISCLAIMER: The information in this bulletin is provided "AS IS" without warranty of any kind. In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.

<< Previous INDEX Search src Set bookmark Go to bookmark Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2025 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру