UltraFXP v1.07 - Stack Buffer Overflow Vulnerability

Type vulnerlab
Reporter Rem0ve
Modified 2011-06-19T00:00:00


                                            Document Title:
UltraFXP v1.07 - Stack Buffer Overflow Vulnerability

Release Date:

Vulnerability Laboratory ID (VL-ID):

Product & Service Introduction:
FTP-Client / FXP-Client (Server-zu-Server) der Spitzenklasse. Verbinden sie sich mit 10 FTP-Servern 
gleichzeitig und übertragen Dateien, ohne den Umweg über den eigenen Rechner. Verschlüsseltes FTP (SSL), 
Scripting-Unterstützung und natürlich ganz normales FTP.

(Copy of the Vendor Homepage: http://www.soft-ware.net)

Abstract Advisory Information:
Vulnerability-Lab Team discovered a Stack-Overflow Vulnerability on UltraFXP v1.07 for Windows.

Vulnerability Disclosure Timeline:
2011-06-20:	Public or Non-Public Disclosure

Discovery Status:

Affected Product(s):

Exploitation Technique:

Severity Level:

Technical Details & Description:
A stack buffer overflow vulnerability is detected on UltraFXP v1.07.x. The Vulnerability is located in the Manueller Download 
mask of the Interface on Arbeitsplatz. The Bug allows an attacker to overwrite the EIP register. Successfull exploitation of 
The bug may allow an attacker escalate out of the affected proccess with the same system privileges.

Vulnerable Module(s):
				[+] Manueller Download

Proof of Concept (PoC):
The vulnerability can be exploited by local attackers. For demonstration or reproduce ...

--- Error Logs ---
Problemereignisame:	APPCRASH
Anwendungsname:		UltraFxp.exe
Anwendungszeitstempel:	2a425e19
Fehlermodulname:	StackHash_e52f
Fehlermodulzeitstempel:	00000000
Ausnahmecode:		c0000005
Ausnahmeoffset:		41414141
Betriebsystemversion:	6.0.6002.
Gebietsschema-ID:	1031
Zusatzinformation 1:	e52f
Zusatzinformation 2:	e98dfca8bcf81bc1740adb135579ad53
Zusatzinformation 3:	860f
Zusatzinformation 4:	6eabdd9e0dc94904be3b39a1c0583635

Registers (FPU)



Security Risk:
The security risk of the stack buffer overflow vulnerability is estimated as critical.

Credits & Authors:

Disclaimer & Information:
The information provided in this advisory is provided as it is without any warranty. Vulnerability-Lab disclaims all warranties, 
either expressed or implied, including the warranties of merchantability and capability for a particular purpose. Vulnerability-
Lab or its suppliers are not liable in any case of damage, including direct, indirect, incidental, consequential loss of business 
profits or special damages, even if Vulnerability-Lab or its suppliers have been advised of the possibility of such damages. Some 
states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation 
may not apply. We do not approve or encourage anybody to break any vendor licenses, policies, deface websites, hack into databases 
or trade with fraud/stolen material.

Domains:    www.vulnerability-lab.com   	- www.vuln-lab.com			       - www.vulnerability-lab.com/register
Contact:    admin@vulnerability-lab.com 	- support@vulnerability-lab.com 	       - research@vulnerability-lab.com
Section:    video.vulnerability-lab.com 	- forum.vulnerability-lab.com 		       - news.vulnerability-lab.com
Social:	    twitter.com/#!/vuln_lab 		- facebook.com/VulnerabilityLab 	       - youtube.com/user/vulnerability0lab
Feeds:	    vulnerability-lab.com/rss/rss.php	- vulnerability-lab.com/rss/rss_upcoming.php   - vulnerability-lab.com/rss/rss_news.php

Any modified copy or reproduction, including partially usages, of this file requires authorization from Vulnerability Laboratory. 
Permission to electronically redistribute this alert in its unmodified form is granted. All other rights, including the use of other 
media, are reserved by Vulnerability-Lab Research Team or its suppliers. All pictures, texts, advisories, sourcecode, videos and 
other information on this website is trademark of vulnerability-lab team & the specific authors or managers. To record, list (feed), 
modify, use or edit our material contact (admin@vulnerability-lab.com or support@vulnerability-lab.com) to get a permission.

    				   	Copyright © 2012 | Vulnerability Laboratory