The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


[NEWS] hpaftpd Multiple Buffer Overflows


<< Previous INDEX Search src / Print Next >>
From: SecuriTeam <support@securiteam.com.>
To: [email protected]
Date: 26 Mar 2007 13:41:19 +0200
Subject: [NEWS] hpaftpd Multiple Buffer Overflows
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id: <20070326155153.6C6245774@mail.tyumen.ru.>
X-Virus-Scanned: antivirus-gw at tyumen.ru

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html 

- - - - - - - - -




  hpaftpd Multiple Buffer Overflows
------------------------------------------------------------------------


SUMMARY

 <http://hpaftpd.sourceforge.net/>; hpaftpd is "a high performance 
anonymous FTP server (RFC 0959). It is designed to run without forks or 
threads and with low memory usage, so it's suitable for heavy network 
traffic with very many connections". beSTORM found multiple buffer 
overflows in hpaftpd, these vulnerabilities are caused by improper usage 
of the insecure sprintf function.

DETAILS

Vulnerable Systems:
 * hpaftpd version 1.01

The hpaftpd reads receives user provided data using the following code:
n = nb_get(nbc, buf, BUF_SIZE - 1);

While BUF_SIZE is defined as:
#define BUF_SIZE    8192

The same BUF_SIZE is used whenever hpaftpd wants to write something to the 
log/user, here is one example which is returned once the user has provided 
a username:
sprintf(obuf, "331 Password required for %s\r\n", ftpc->user);

As you can see, even though ftpc->user is limited to 8192, the obuf is 
also limited to 8192:
char buf[BUF_SIZE], obuf[BUF_SIZE]; /* Input buffer, output buffer */

Allowing us to supply numerous commands and arguments which in turn will 
overflow the obuf buffer.

The following commands can be used to overflow the obuf buffer:
 * USER
 * PASS (with a combination of a USER command)
 * CWD
 * MKD
 * RMD
 * DELE
 * RNFR
 * RNTO (with a vald RNFR combination)

Site note:
There appears to be a past attempt to prevent buffer overflows found in 
the path related functions, as they use snprintf instead of sprintf.


ADDITIONAL INFORMATION

This vulnerability has been found by  
<http://www.beyondsecurity.com/beSTORM>; beSTORM. Visit our web site to 
download a free 30 day evaluation of beSTORM.




This bulletin is sent to members of the SecuriTeam mailing list. To unsubscribe from the list, send mail with an empty subject line and body to: [email protected] In order to subscribe to the mailing list, simply forward this email to: [email protected]

DISCLAIMER: The information in this bulletin is provided "AS IS" without warranty of any kind. In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.

<< Previous INDEX Search src / Print Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2025 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру