Cerberus FTP Server 1.x Remote DoS attack Vulnerability
Cartel Advisory Code: CART-0101
Public Disclosure Date: 21-06-2001
Systems Affected: Cerberus FTP Server, 1.x (1.2 and 1.5 were tested only)
Credits: Nicolas Brulez - Brulez@cartel-info.fr
Cartel security team has found a buffer overflow in the Cerberus FTP server, which means that an attacker can execute a denial of service attack against it.This attack will crash the server, without any error. FTP service is then unavailable.
The binary exploit is given as a proof of concept. It is for educational purpose only. Cartel team can't be held responsible for anything you do with this file. The exploit file has been fully coded in Win32 assembly language.
220-Welcome to Cerberus FTP Server 220 Created by Grant Averett USER [buffer] PASS [anything]
[buffer] is aprox. 320 characters.
A good combination of the buffer and pass is needed in order to crash the server.Passing only a BIG user won't crash anything.
Date of Vendor Notification: 20-6-2001
Waiting answer from the author.
Fix: none yet.
Greetings to my friends at:
USSR, Hert,Vauban systems and qualys.
Cartel is a company based in France, dedicated to Research about network security and application security systems.
Security services provided are :
Copyright (c) Cartel informatique Security Research LABS. This Document is copyrighted.It can't be edited nor republished without explicit consent of CARTEL LABS.
For more informations, feel free to contact us.
Cartel info security research labs mail: email@example.com http://securite.cartel-info.fr/ (french site)