The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


Meteor FTP Server v1.5 Buffer Overflow


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
Date: 23 May 2005 16:14:37 -0000
From: Auston J <Anix44@gmail.com.>
To: [email protected]
Subject: Meteor FTP Server v1.5 Buffer Overflow
X-Virus-Scanned: antivirus-gw at tyumen.ru



The overflow is triggered once a series of commands have been issued with specific criteria. In theory, using the USER command followed by a large amount of data will result in memory corruption as we have seen previously. However, if the PASS and PORT command are also issued with the right arguments, the memory corruption may be re-aligned to create a buffer overflow.

Psuedo Exploitation...

USER (A x 80) (Following 4 Bytes = New Return Point)
PASS 0wn3r
PORT 127,0,0,1,18,12 (Must be same as connecting IP)

At this point the server hangs. If the connection were manually disconnected, or left to time out on it's own (5 minutes by default), the violation will be thrown.


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2025 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру