[38946] in bugtraq

home help back first fref pref prev next nref lref last post

Meteor FTP Server v1.5 Buffer Overflow

daemon@ATHENA.MIT.EDU (Auston J)
Mon May 23 13:11:21 2005

Date: 23 May 2005 16:14:37 -0000
Message-ID: <20050523161437.28850.qmail@www.securityfocus.com>
Content-Type: text/plain
Content-Disposition: inline
Content-Transfer-Encoding: binary
MIME-Version: 1.0
From: Auston J <Anix44@gmail.com>
To: bugtraq@securityfocus.com



The overflow is triggered once a series of commands have been issued with specific criteria. In theory, using the USER command followed by a large amount of data will result in memory corruption as we have seen previously. However, if the PASS and PORT command are also issued with the right arguments, the memory corruption may be re-aligned to create a buffer overflow.

Psuedo Exploitation...

USER (A x 80) (Following 4 Bytes = New Return Point)
PASS 0wn3r
PORT 127,0,0,1,18,12 (Must be same as connecting IP)

At this point the server hangs. If the connection were manually disconnected, or left to time out on it's own (5 minutes by default), the violation will be thrown.

home help back first fref pref prev next nref lref last post