Re: [Full-Disclosure] ProFtp bufferoverflow.
From: Andreas Gietl (a.gietl_at_e-admin.de)
To: "Epic" <firstname.lastname@example.org> Date: Fri, 5 Mar 2004 00:35:27 +0100
On Thursday 04 March 2004 20:44, Epic wrote:
> "The vulnerability is caused due to a boundary error in the ASCII file
> transfer component when translating newline characters. This can be
> exploited to cause a buffer overflow by uploading and then downloading a
> specially crafted file."
> "The vulnerability is caused due to two off-by-one errors in the
> "_xlate_ascii_write()" function. These can be exploited by sending a
> specially crafted "RETR" FTP command with a 1023 bytes long argument
> starting with a linefeed character."
> I am not expert, and was wondering If this was actually something new in
> the same ASCII File translation.?
i really don't think the vuln is new. The advisory you sent says proftpd <
1.2.9rc3 is vulnerable. 1.2.9rc3 was exactly the version THIS BUG was fixed.
Full-Disclosure - We believe in it.