[21002] in bugtraq

home help back first fref pref prev next nref lref last post

Rumpus FTP DoS vol. 2

daemon@ATHENA.MIT.EDU (Jass Seljamaa)
Wed Jun 13 17:46:49 2001

To: Bugtraq <BUGTRAQ@securityfocus.com>
Message-ID: <992372927.3b2668bf08409@email.isp.ee>
Date: Tue, 12 Jun 2001 21:08:47 +0200 (EET)
From: Jass Seljamaa <jass@email.isp.ee>
MIME-Version: 1.0
Content-Type: text/plain
Content-Transfer-Encoding: 8bit

If anyone remembers I posted a DoS Vulnerability description to BugTraq, and 
Rumpus Developers quickly repaired, it, but they missed a thing. When executing 
command mkdir A:A:A:A:A:A:A:A:A:A:A:A:A:A:A:A:A:A:A:A Rumpus quits, its not a 
system freeze, but FTP service will be denied. This is a stack overflow caused 
by recurising through the folder creation routine that happens when many layers 
of sub-folders are created at once. The Guys behind Rumpus(Maxum) is a really 
good team of developers... I mentioned the vulnerability and in hours there was 
a new, fixed version. So vulnerable versions are: 1.3.5 and earlier, 2.0dev3. 
Not vulnerable: 1.3.6(I guess it should be downloadable already) and later...


Jass Seljamaa,
jass@isp.ee
05212242  


-------------------------------------------------
This mail sent through IMP: email.isp.ee

home help back first fref pref prev next nref lref last post