BlackJumboDog contains buffer overflow vulnerability

2004-08-03T00:00:00
ID VU:714584
Type cert
Reporter CERT
Modified 2005-04-14T00:00:00

Description

Overview

BlackJumboDog fails to verify the length of several FTP commands, creating a buffer overflow vulnerability. Exploitation of this vulnerability may result in code execution on the target system with privileges of the FTP service.

Description

BlackJumboDog is a multi-function server for Microsoft Windows, providing FTP, email, web, and proxy services. Version 3.6.1 contains a buffer overflow vulnerability. BlackJumboDog fails to check the length of FTP commands passed to it. Using specially crafted FTP commands, a remote user can trigger a buffer overflow condition and possibly execute code on the server.


Impact

A remote attacker may be able to exploit this vulnerability to compromise the BlackJumboDog system.


Solution

This issue has been resolved in version 3.6.2 of BlackJumboDog.


Systems Affected

Vendor| Status| Date Notified| Date Updated
---|---|---|---
SapporoWorks| | -| 03 Aug 2004
If you are a vendor and your product is affected, let us know.

CVSS Metrics

Group | Score | Vector
---|---|---
Base | N/A | N/A
Temporal | N/A | N/A
Environmental | N/A | N/A

References

  • <http://secunia.com/advisories/12203/>
  • <http://www.security.org.sg/vuln/bjd361.html>

Credit

Thanks to Secunia, Tan Chew Keong, and SIG^2 for the information contained in their security advisories

This document was written by Will Dormann.

Other Information

  • CVE IDs: Unknown
  • Date Public: 02 Aug 2004
  • Date First Published: 03 Aug 2004
  • Date Last Updated: 14 Apr 2005
  • Severity Metric: 3.37
  • Document Revision: 14