[9333] in bugtraq

home help back first fref pref prev next nref lref last post

Re: WS FTP Server Advisory

daemon@ATHENA.MIT.EDU (Darren Reed)
Thu Feb 4 12:30:25 1999

Date: 	Thu, 4 Feb 1999 00:29:07 +1100
Reply-To: Darren Reed <avalon@COOMBS.ANU.EDU.AU>
From: Darren Reed <avalon@COOMBS.ANU.EDU.AU>
X-To:         marc@EEYE.COM
To: BUGTRAQ@NETSPACE.ORG
In-Reply-To:  <029601be4ef0$538a9060$abd40018@CORE> from "Marc" at Feb 2,
              99 01:09:21 pm

[...]
> AAAAAAAAAAAAAAAA
> Connection to host lost.
>
> The iFtpSvc.exe (Server Exe) process has now exited and therefore the
> WS_FTP Server will no longer respond. There is no error displayed on
> screen nor is the event log written to. The smallest amount of characters
> needed it 876. So sending "cwd b" where b > 875 will crash the remote
> server.

Evidence of an overflow of some sort.  The question I'm interested
in knowing the answer to is how easy is it to exploit this to obtain
a remote session or system access ?  Presumably starting up a
"command" window is not the answer here :-)

darren

home help back first fref pref prev next nref lref last post