UltraFXP v1.07 - Stack Buffer Overflow Vulnerability

2011-06-19T00:00:00
ID VULNERLAB:162
Type vulnerlab
Reporter Rem0ve
Modified 2011-06-19T00:00:00

Description

                                        
                                            Document Title:
===============
UltraFXP v1.07 - Stack Buffer Overflow Vulnerability



Release Date:
=============
2011-06-19


Vulnerability Laboratory ID (VL-ID):
====================================
162


Product & Service Introduction:
===============================
FTP-Client / FXP-Client (Server-zu-Server) der Spitzenklasse. Verbinden sie sich mit 10 FTP-Servern 
gleichzeitig und übertragen Dateien, ohne den Umweg über den eigenen Rechner. Verschlüsseltes FTP (SSL), 
Scripting-Unterstützung und natürlich ganz normales FTP.

(Copy of the Vendor Homepage: http://www.soft-ware.net)


Abstract Advisory Information:
==============================
Vulnerability-Lab Team discovered a Stack-Overflow Vulnerability on UltraFXP v1.07 for Windows.


Vulnerability Disclosure Timeline:
==================================
2011-06-20:	Public or Non-Public Disclosure


Discovery Status:
=================
Published


Affected Product(s):
====================

Exploitation Technique:
=======================
Remote


Severity Level:
===============
Critical


Technical Details & Description:
================================
A stack buffer overflow vulnerability is detected on UltraFXP v1.07.x. The Vulnerability is located in the Manueller Download 
mask of the Interface on Arbeitsplatz. The Bug allows an attacker to overwrite the EIP register. Successfull exploitation of 
The bug may allow an attacker escalate out of the affected proccess with the same system privileges.

Vulnerable Module(s):
				[+] Manueller Download


Proof of Concept (PoC):
=======================
The vulnerability can be exploited by local attackers. For demonstration or reproduce ...

--- Error Logs ---
Problemereignisame:	APPCRASH
Anwendungsname:		UltraFxp.exe
Anwendungsversion:	0.0.0.0
Anwendungszeitstempel:	2a425e19
Fehlermodulname:	StackHash_e52f
Fehlermodulversion:	0.0.0.0
Fehlermodulzeitstempel:	00000000
Ausnahmecode:		c0000005
Ausnahmeoffset:		41414141
Betriebsystemversion:	6.0.6002.2.2.0.768.3
Gebietsschema-ID:	1031
Zusatzinformation 1:	e52f
Zusatzinformation 2:	e98dfca8bcf81bc1740adb135579ad53
Zusatzinformation 3:	860f
Zusatzinformation 4:	6eabdd9e0dc94904be3b39a1c0583635

Registers (FPU)

EAX=000017BF
ECX=7C91056D
EDX=00150608
EBX=41414141
ESP=0012F96C
EBP=0012F9AC
ESI=9A011112
EIP=41414141



Pictures:
			../stack-overflow.png
			../stack-overflow2.png
			../stack-overflow3.png


Security Risk:
==============
The security risk of the stack buffer overflow vulnerability is estimated as critical.


Credits & Authors:
==================
Rem0ve


Disclaimer & Information:
=========================
The information provided in this advisory is provided as it is without any warranty. Vulnerability-Lab disclaims all warranties, 
either expressed or implied, including the warranties of merchantability and capability for a particular purpose. Vulnerability-
Lab or its suppliers are not liable in any case of damage, including direct, indirect, incidental, consequential loss of business 
profits or special damages, even if Vulnerability-Lab or its suppliers have been advised of the possibility of such damages. Some 
states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation 
may not apply. We do not approve or encourage anybody to break any vendor licenses, policies, deface websites, hack into databases 
or trade with fraud/stolen material.

Domains:    www.vulnerability-lab.com   	- www.vuln-lab.com			       - www.vulnerability-lab.com/register
Contact:    admin@vulnerability-lab.com 	- support@vulnerability-lab.com 	       - research@vulnerability-lab.com
Section:    video.vulnerability-lab.com 	- forum.vulnerability-lab.com 		       - news.vulnerability-lab.com
Social:	    twitter.com/#!/vuln_lab 		- facebook.com/VulnerabilityLab 	       - youtube.com/user/vulnerability0lab
Feeds:	    vulnerability-lab.com/rss/rss.php	- vulnerability-lab.com/rss/rss_upcoming.php   - vulnerability-lab.com/rss/rss_news.php

Any modified copy or reproduction, including partially usages, of this file requires authorization from Vulnerability Laboratory. 
Permission to electronically redistribute this alert in its unmodified form is granted. All other rights, including the use of other 
media, are reserved by Vulnerability-Lab Research Team or its suppliers. All pictures, texts, advisories, sourcecode, videos and 
other information on this website is trademark of vulnerability-lab team & the specific authors or managers. To record, list (feed), 
modify, use or edit our material contact (admin@vulnerability-lab.com or support@vulnerability-lab.com) to get a permission.

    				   	Copyright © 2012 | Vulnerability Laboratory