Microsoft IIS FTPd NLST Remote Buffer Overflow Vulnerability

Microsoft reported limited in-the-wild exploitation of this issue.

A working commercial exploit is available through VUPEN Security - Exploit and PoCs Service. This exploit is not otherwise publicly available or known to be circulating in the wild.

Core Security Technologies has developed a working commercial exploit for its CORE IMPACT product. This exploit is not otherwise publicly available or known to be circulating in the wild.

The following pattern can trigger a denial of service, without write access to the server, assuming a directory name that starts with 'A' and is at least 14 characters in length:

NLST [Ax206]*/../A*/../A*/../A*/../A*/../A*/../A*/../A*/\r\n

The following exploits are available:


 

Privacy Statement
Copyright 2010, SecurityFocus