[29572] in bugtraq

home help back first fref pref prev next nref lref last post

Personal FTP Server

daemon@ATHENA.MIT.EDU (subj)
Mon Mar 31 19:29:09 2003

Date: 31 Mar 2003 10:37:17 -0000
Message-ID: <20030331103717.8235.qmail@www.securityfocus.com>
Content-Type: text/plain
Content-Disposition: inline
Content-Transfer-Encoding: binary
MIME-Version: 1.0
From: subj <r2subj3ct@dwclan.org>
To: bugtraq@securityfocus.com



---------------------------------------
Product : Personal FTP Server
Version : ?
OSystem : Windows
Authors : CoolSoft
WebSite : http://www.cooolsoft.com
Problem : 
        * Buffer Overflow in field USER
---------------------------------------

Description:
------------

eng:
====
Overflow of the buffer occurs in field USER if contain with field USER to 
transfer more than 320 bytes of dust.
The ambassador realization of the above described operation, the server 
simply will fall, and will not respond as on client,
And any other searches. To close server it is possible to awake only end 
of process

Exploit:
--------
*************************************
>>Telnet 127.0.0.1:21
220 Personal FTP Server ready
>>USER AAAAAAA...AAAAA [320b]
*************************************




Contacts:
---------

r2subj3ct@dwclan.org
subj.24h.to (www.dwcgr0up.com/subj/)
www.dwcgr0up.com
irc.dwcgr0up.biz #dwc

Thanks:
-------
 DHG, GipsHack, Netp0is0n, de1irium, r00tc0de, f0kp, exploit.ru, 
security.nno.ru
 DethSpirit, r4ShRaY, D4rkGr3y, 3APA3A, Moby, Orb, Foster, Owned, prior, 
Demon.

home help back first fref pref prev next nref lref last post