mailing list archives
4D WebSTAR FTP Buffer Overflow.
From: B-r00t <br00t () blueyonder co uk>
Date: Fri, 12 Sep 2003 00:36:22 +0100 (BST)
-----BEGIN PGP SIGNED MESSAGE-----
Remote Vulnerability in 4D WebSTAR Server Suite.
Author: B-r00t. 2003.
Email: B-r00t <br00t () blueyonder co uk>
Versions: 4D WebSTAR 5.3.1 (Latest) => VULNERABLE.
Tested: 4D WebSTAR 5.3.1 (Trial Version).
Exploit: [attached] 4DWS_ftp.c - Gives a shell on port 6969.
Description: There is a pre authentication buffer overflow
that exists in the login mechanism of the WebSTAR
FTP service. As shown below: -
$ ftp maki
Connected to maki (192.168.0.69).
220 FTP server ready.
Name (maki:br00t): test
331 User name OK, need password.
530 FTP login failed.
421 Service not available, remote server has closed connection
The following information is reported in the crash
Date/Time: 2003-09-08 09:25:24 +0100
OS Version: 10.2.6 (Build 6L60)
Exception: EXC_BAD_ACCESS (0x0001)
Codes: KERN_INVALID_ADDRESS (0x0001) at 0x61626364
PPC Thread State:
srr0: 0x61626364 srr1: 0x4000f030 vrsave: 0x00000000
xer: 0x00000000 lr: 0x61626364 ctr: 0x90000e40 mq: 0x00000000
r0: 0x61626364 r1: 0xf02874f0 r2: 0xa0007728 r3: 0xf0288cd0
r4: 0xf02872e0 r5: 0x0000005e r6: 0x80808080 r7: 0x00000001
r8: 0x30000000 r9: 0x00954e64 r10: 0xf02870aa r11: 0x00959e94
r12: 0x00000000 r13: 0x00000000 r14: 0x00000000 r15: 0x00000000
r16: 0x00000000 r17: 0x00000000 r18: 0x00000000 r19: 0x00000000
r20: 0x00000000 r21: 0x00000000 r22: 0x00000000 r23: 0x0000000b
r24: 0x00958fec r25: 0x00958fec r26: 0x58585858 r27: 0x58585858
r28: 0x58585858 r29: 0x58585858 r30: 0x58585858 r31: 0x58585858
As can be seen from the crash dump, the application
has attempted to execute code at '0x61626364' which
is ASCII code for 'abcd'. Being able to influence the
applications execution process means it is possible
for an attacker to execute arbitrary code and thus
gain access to the target machine. Fortunately, the
service is running as the 'webstar' user which is not
an administrative account by default. However, once an
attacker has gained initial access to the target machine,
it is possible to access the system password hashes using
the 'nidump' utility and hence possibly gain admin (root)
priveleges if these hashes are cracked.
FIX: Disable the FTP service until a fix is available.
Email : B-r00t <br00t () blueyonder co uk>
Key fingerprint = 74F0 6A06 3E57 083A 4C9B
ED33 AD56 9E97 7101 5462
"You Would Be Paranoid If They Were Watching You !!!"
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (OpenBSD)
-----END PGP SIGNATURE-----
- 4D WebSTAR FTP Buffer Overflow. B-r00t (Sep 12)