FileCOPA FTP Server LIST Command Overflow

2006-07-19T08:19:04
ID OSVDB:27389
Type osvdb
Reporter Appsec()
Modified 2006-07-19T08:19:04

Description

Vulnerability Description

A remote or local overflow exists in FileCOPA FTP server. The server fails to handle a long (Approx 350 bytes) parameter to the LIST command resulting in a buffer overflow. With a specially crafted LIST command, an attacker can cause a denial of service or possibly execute arbitrary code.

Technical Description

An attacker must supply valid authentication credentials in order to exploit this vulnerability.

Solution Description

Upgrade to version 1.01 (2006-07-18) or higher, as it has been reported to fix this vulnerability. Note that this flaw was fixed in the 2006-07-18 release without a change in version number. An upgrade is required as there are no known workarounds.

Short Description

A remote or local overflow exists in FileCOPA FTP server. The server fails to handle a long (Approx 350 bytes) parameter to the LIST command resulting in a buffer overflow. With a specially crafted LIST command, an attacker can cause a denial of service or possibly execute arbitrary code.

References:

Vendor URL: http://www.filecopa.com Secunia Advisory ID:21108 Other Advisory URL: http://www.appsec.ch/docs/2006-07-19-fileCopa.txt ISS X-Force ID: 27817 FrSIRT Advisory: ADV-2006-2870 CVE-2006-3726 Bugtraq ID: 19065