[12499] in bugtraq

home help back first fref pref prev next nref lref last post

Remote DoS Attack in TransSoft's Broker Ftp Server v3.5

daemon@ATHENA.MIT.EDU (Ussr Labs)
Tue Nov 9 13:56:31 1999

Mime-Version: 1.0
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
Message-Id:  <NCBBKFKDOLAGKIAPMILPIEJNCAAA.labs@ussrback.com>
Date:         Mon, 8 Nov 1999 23:44:18 -0300
Reply-To: Ussr Labs <labs@USSRBACK.COM>
From: Ussr Labs <labs@USSRBACK.COM>
X-To:         BUGTRAQ <bugtraq@securityfocus.com>
To: BUGTRAQ@SECURITYFOCUS.COM

Remote DoS Attack in TransSoft's Broker Ftp Server  v3.5 Vulnerability

PROBLEM

UssrLabs found a Remote DoS Attack in TransSoft's Broker Ftp Server v3.5,
the buffer overflow is caused by a long user name 2730 characters.
If TransSoft's Broker Server is running as a service the service will start
eating all memory and all computer resource CPU 100%, at the moment of no
more memory, if this happend all system is down :(

There is not much to expand on.... just a simple hole

Example:

Go to: http://www.ussrback.com/broker35/

For the source / binary of this remote / local D.O.S


Vendor Status:
Not Contacted

Vendor   Url: http://www.transsoft.com
Program Url:http://www.ftpcontrol.com/broker/index.html

Credit: USSRLABS

SOLUTION
    Nothing yet.

home help back first fref pref prev next nref lref last post