The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


[NT] Quick 'n Easy FTP Server Logging Unicode Buffer Overflow


<< Previous INDEX Search src / Print Next >>
From: SecuriTeam <support@securiteam.com.>
To: [email protected]
Date: 1 May 2006 14:06:33 +0200
Subject: [NT] Quick 'n Easy FTP Server Logging Unicode Buffer Overflow
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id: <20060501123535.6359E57D4@mail.tyumen.ru.>
X-Virus-Scanned: antivirus-gw at tyumen.ru

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html 

- - - - - - - - -




  Quick 'n Easy FTP Server Logging Unicode Buffer Overflow
------------------------------------------------------------------------


SUMMARY

" 
<http://www.pablosoftwaresolutions.com/html/quick__n_easy_ftp_server_pro.html>; Quick 'n Easy FTP Server Professional is a multi threaded FTP server for Windows 98/NT/XP that can be easily setup even by inexperienced users."

Improper string length validation allows attackers to execute arbitrary 
code using a buffer overflow in Quick 'n Easy FTP Server .

DETAILS

A Unicode overflow with the logging process of Quick 'n Easy FTP Server 
exists when long string sent as an argument of a command when a user 
arrive to the logging section, an overflow happens and the SEH can execute 
arbitrary code.

Due to the fact that the overflow is caused by Unicode, exploitation might 
not be stable.

Proof of Concept:
Login to the FTP Server then try :
command aaaaa < about 1100 a (0x61) here > aaaa
Then in the FTP server main window go to Logging section .
The FTP Server will crash . and in the ftptrace.txt there is an entry:

24/07/2006 20:41:53.500 Exception caught by MainExceptionHandler():
Exception      : c0000005
Address        : 00610061
Access Type    : write
Access Address : 00000000

Please note that the FTP server detect the overflow of a long string, and 
prevent a pointer overwrite.

Disclosure Timeline:
March 26 , 2006  : vender contacted
March 27 , 2006  : vender replyed
March 27 , 2006  : vender contacted , example provided
March 28 , 2006  : vender replyed
March 28 , 2006  : vender contacted , C code provided to test the vuln.
March 29 , 2006  : vender replyed
April 25 , 2006  : public release


ADDITIONAL INFORMATION

The information has been provided by  <mailto:c0d3r@ihsteam.com.> Kaveh 
Razavi.




This bulletin is sent to members of the SecuriTeam mailing list. To unsubscribe from the list, send mail with an empty subject line and body to: [email protected] In order to subscribe to the mailing list, simply forward this email to: [email protected]

DISCLAIMER: The information in this bulletin is provided "AS IS" without warranty of any kind. In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.

<< Previous INDEX Search src / Print Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2025 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру