Max-Wilhelm Bruker bftpd Buffer Overflow Vulnerability

A buffer overflow vulnerability has been confirmed in version 1.0.13 of Max-Wilhelm Bruker's FTP server BFTPD.

The program fails to properly validate user-supplied input argumenting the SITE CHOWN command.

An attacker could send a maliciously-formed string of characters following this command which exceeds the maximum length of the input buffer.

The values stored in this buffer can overflow onto the stack, potentially overwriting the calling functions' return address with values that can alter the program's flow of execution. This could result in a remote attacker gaining root access on the target host.


 

Privacy Statement
Copyright 2010, SecurityFocus