[14207] in bugtraq

home help back first fref pref prev next nref lref last post

(BisonWare FTP Server V3.5 Roses Labs Security Advisory) is a old

daemon@ATHENA.MIT.EDU (Ussr Labs)
Wed Mar 8 04:22:49 2000

Mime-Version: 1.0
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
Message-Id:  <NCBBKFKDOLAGKIAPMILPCENLCCAA.labs@ussrback.com>
Date:         Tue, 7 Mar 2000 04:27:40 -0300
Reply-To: Ussr Labs <labs@USSRBACK.COM>
From: Ussr Labs <labs@USSRBACK.COM>
X-To:         BUGTRAQ <bugtraq@securityfocus.com>
To: BUGTRAQ@SECURITYFOCUS.COM

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ----------------------------------------------------------------------
- --------------------------------------------
		Roses Labs Security Advisory
                ----------------------------

  Author: Conde Vampiro
  Roses Labs Advisory Code: RLA002
  Date: 2/29/2000.
  Software: BisonWare FTP Server V3.5
  Platform: Windows 9x/NT.
  Risk: Remote buffer overflow, that allow
  to crash the FTP Server. (Maybe also be
  possible to execute arbitrary code.)

  ------------
  Introduction
  ------------

	Bison FTP Server is a FTP server that
  runs on windows platforms. An intruder can launch
  an attack that will crash the FTP server.

  ------
  Detail
  ------

	Sending a "LOGIN" & "PASSWORD" of 550 characters
  each, will crash the FTP Server. This is the error that
  the FTP will produce:

  "Exception EAccessViolation in module BISONFTP.EXE at
   0A0D4858. Access vilation at address 0A0D5858. Read of
   address 0A0D5858."

  ----
  Code
  ----

	Warning: Neither the Roses Labs or the author accept
  any responsibility of the use of this code. This code will
  crash the FTP server.

  ---	
  Fix
  ---

	This problem is fixed in V4.1 out soon.

  ----
  Note	
  ----

	This bug was found using Cyber Host
  Auditor (CHA). CHA is a security tool coded by
  The Roses Labs to discover in a easy way DoS &
  possible buffer overflows.

  Roses Labs / w00w00
  http://www.roses-labs.com
  Advanced Security Research.


- ----------------------------------------------------------------------
- --------------------------------------------

Ussr labs Release the Advisory the day 25/11/1999 reporting the
BisonWare FTP Server V3.5 problem, i dont know why
but is never posted in bugtraq. (we send the message).

"Your message dated Wed, 24 Nov  1999 22:55:02 -0300 with subject
"Remote DoS
Attack in BisonWare FTP Server V3.5 Vulnerability" has been submitted
to the
moderator of the BUGTRAQ list: Elias Levy
<aleph1@SECURITYFOCUS.COM>."

but nobody post it in bugtraq.



http://www.ntsecurity.net/scripts/win2ks-l.asp?A2=IND9911D&L=WIN2KSECA
DVICE&F=&S=&P=1327
Remote DoS Attack in BisonWare FTP Server V3.5 Vulnerability
Remote DoS Attack in BisonWare FTP Server V3.5 Vulnerability (44
lines)
From: Ussr Labs <labs@USSRBACK.COM>
Date: Wed, 24 Nov 1999 22:52:41 -0300



http://www.ntsecurity.net/scripts/win2ks-l.asp?A2=IND9911D&L=WIN2KSECA
DVICE&F=&S=&P=1541
SV: Remote DoS Attack in BisonWare FTP Server V3.5 Vulnerability
SV: Remote DoS Attack in BisonWare FTP Server V3.5 Vulnerability (69
lines)
From: Arne Vidstrom <winnt@BAHNHOF.SE>
Date: Thu, 25 Nov 1999 23:50:44 +0100



u n d e r g r o u n d  s e c u r i t y  s y s t e m s  r e s e a r c
h
http://www.ussrback.com


-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 6.5.2 for non-commercial use <http://www.pgp.com>

iQA/AwUBOMSvbNybEYfHhkiVEQJWNACgpocEeWJy5jLKYyJiimyC4+mKZhYAoLwU
v6dek/h+bVYxBu2QwXB6TWC8
=nTbQ
-----END PGP SIGNATURE-----

home help back first fref pref prev next nref lref last post