[16022] in bugtraq

home help back first fref pref prev next nref lref last post

Re: AnalogX Proxy DoS

daemon@ATHENA.MIT.EDU (Pavel Machek)
Mon Jul 31 14:59:25 2000

Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Message-ID:  <20000730211136.A21604@bug.ucw.cz>
Date:         Sun, 30 Jul 2000 21:11:36 +0200
Reply-To: Pavel Machek <pavel@UCW.CZ>
From: Pavel Machek <pavel@UCW.CZ>
X-To:         labs@FOUNDSTONE.COM
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  <2153DBA073F0D311911100B0D01A826F16CC14@206-135-57-166.gw.eni.net>; from labs@FOUNDSTONE.COM on Mon,
              Jul 24, 2000 at 08:02:22PM -0700

Hi!

> Severity:               Low
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

> Proof of concept
>
>         Sending an FTP "USER" command containing approximately 370 or
>         more characters to the proxy server FTP TCP port 21 will crash
>         it.
>
>         Example #1: nc 192.168.1.2 21 < ftp.txt
>
>         Where ftp.txt contains:
>         "USER [long string of ~370 chars]@isp.com"

Denial of service only? It does not look so. It looks much more like
possibility to run arbitrary code on your windows machine! Or is
there specific reason why this can't be used to run arbitrary code?
								Pavel
PS: It seems to me that many "Denial of Services" for windows machines
are "run arbitrary code" instead. It would be nice if people in
advisories told why their think that "run arbitrary code" is not
possible.
--
I'm pavel@ucw.cz. "In my country we have almost anarchy and I don't care."
Panos Katsaloulis describing me w.r.t. patents at discuss@linmodems.org

home help back first fref pref prev next nref lref last post