The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


cesarFTP v0.98b 'HELP' buffer overflow


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
Date: Sat, 30 Jun 2001 02:36:21 -0700 (PDT)
From: ByteRage <[email protected]>
To: [email protected]
Subject: cesarFTP v0.98b 'HELP' buffer overflow

DESCRIPTION

CesarFTP v0.98b is vulnerable to a buffer overflow
when sending the HELP command followed by a very long
string of characters.

Example : Sending the following perl string :

"HELP " . ("A" x 1978) . "CCCC\x00\x0D\x0A" 

Happily reroutes the SERVER.EXE EIP to 43434343
("CCCC"). This way, anyone can easily compromise the
win9x/NT/2k system, without the need to be logged in.
The only tricky part in writing the exploit is that
SERVER.EXE doesn't have LoadLibraryA & GetProcAddress
in it's import table, but there are enough other
functions that give away enough power to take over the
computer (registry functions, CreateDirectoryA,
CreateFileA, ReadFile, WriteFile, ShellExecuteA, ...)
I have not written an exploit and probably I never
will :)

VENDOR STATUS

I have sent this advisory to <[email protected]>

greetz,
[ByteRage] <[email protected]> byterage.cjb.net

__________________________________________________
Do You Yahoo!?
Get personalized email addresses from Yahoo! Mail
http://personal.mail.yahoo.com/

<< Previous INDEX Search src Set bookmark Go to bookmark Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2025 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру