mailing list archives
Re: ProFtp bufferoverflow.
From: Andreas Gietl <a.gietl () e-admin de>
Date: Fri, 5 Mar 2004 00:35:27 +0100
On Thursday 04 March 2004 20:44, Epic wrote:
"The vulnerability is caused due to a boundary error in the ASCII file
transfer component when translating newline characters. This can be
exploited to cause a buffer overflow by uploading and then downloading a
specially crafted file."
"The vulnerability is caused due to two off-by-one errors in the
"_xlate_ascii_write()" function. These can be exploited by sending a
specially crafted "RETR" FTP command with a 1023 bytes long argument
starting with a linefeed character."
I am not expert, and was wondering If this was actually something new in
the same ASCII File translation.?
i really don't think the vuln is new. The advisory you sent says proftpd <
1.2.9rc3 is vulnerable. 1.2.9rc3 was exactly the version THIS BUG was fixed.
Full-Disclosure - We believe in it.
RE: Backdoor not recognized by Kaspersky Thor Larholm (Mar 04)
RE: Backdoor not recognized by Kaspersky Schmehl, Paul L (Mar 04)
Re: Backdoor not recognized by Kaspersky orangganjil (Mar 04)
RE: Backdoor not recognized by Kaspersky Ian Latter (Mar 05)