The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


Re[2]: Microsoft FTP Client Multiple Bufferoverflow Vulnerability


<< Previous INDEX Search src / Print Next >>
Date: Fri, 30 Nov 2007 12:48:43 +0300
From: 3APA3A <3APA3A@SECURITY.NNOV.RU.>
To: [email protected]
Subject: Re[2]: Microsoft FTP Client Multiple Bufferoverflow Vulnerability
In-Reply-To: <7366.1196374789@turing-police.cc.vt.edu.>
References: <261966.44430.qm@web30413.mail.mud.yahoo.com.>
 <1066197146.20071129144606@SECURITY.NNOV.RU.>
 <7366.1196374789@turing-police.cc.vt.edu.>
MIME-Version: 1.0
Content-Type: text/plain; charset=Windows-1251
Content-Transfer-Encoding: quoted-printable
X-Virus-Scanned: antivirus-gw at tyumen.ru

Dear [email protected],



--Friday, November 30, 2007, 1:19:49 AM, you wrote to [email protected]=
V.RU:


>> An attacker who can convince an user to extract a specially crafted
>> archive can overwrite arbitrary files with the permissions of the user
>> running gtar.  If that user is root, the attacker can overwrite any
>> file on the system.

VKve> Apparently, somebody at FreeBSD thinks "can be exploited if you tri=
ck the
VKve> user into doing something" is a valid attack vector.

This  is  valid  factor.  The  difference  is,  if you can force user to
extract  archive, you need vulnerability in gtar in order to exploit. If
you  can  force user to run executable script, you need no vulnerability
in FTP client to exploit this.


--=20
~/ZARAZA http://securityvulns.com/
=CD=E5=EF=F0=E8=FF=F2=ED=EE=F1=F2=E8 =ED=E0=F7=ED=F3=F2=F1=FF =E2 =E2=EE=F1=
=E5=EC=FC.  (=D2=E2=E5=ED)



<< Previous INDEX Search src / Print Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2025 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру