Re: [Full-Disclosure] ProFtp bufferoverflow.

From: Andreas Gietl (a.gietl_at_e-admin.de)
Date: 03/05/04

  • Next message: Stefan Bethke: "[Full-Disclosure] Re: Multiple issues with Mac OS X AFP client"
    To: "Epic" <epic@hack3r.com>
    Date: Fri, 5 Mar 2004 00:35:27 +0100
    
    

    On Thursday 04 March 2004 20:44, Epic wrote:
    > Isn't
    >
    > "The vulnerability is caused due to a boundary error in the ASCII file
    > transfer component when translating newline characters. This can be
    > exploited to cause a buffer overflow by uploading and then downloading a
    > specially crafted file."
    >
    > And.
    >
    >
    > "The vulnerability is caused due to two off-by-one errors in the
    > "_xlate_ascii_write()" function. These can be exploited by sending a
    > specially crafted "RETR" FTP command with a 1023 bytes long argument
    > starting with a linefeed character."
    >
    > Different?
    >
    > I am not expert, and was wondering If this was actually something new in
    > the same ASCII File translation.?

    i really don't think the vuln is new. The advisory you sent says proftpd <
    1.2.9rc3 is vulnerable. 1.2.9rc3 was exactly the version THIS BUG was fixed.

    >
    > Epic
    >

    _______________________________________________
    Full-Disclosure - We believe in it.
    Charter: http://lists.netsys.com/full-disclosure-charter.html


  • Next message: Stefan Bethke: "[Full-Disclosure] Re: Multiple issues with Mac OS X AFP client"