BugTraq
Microsoft FTP Client Multiple Bufferoverflow Vulnerability Nov 28 2007 06:12AM
Rajesh Sethumadhavan (rajesh sethumadhavan yahoo com) (1 replies)
Re: Microsoft FTP Client Multiple Bufferoverflow Vulnerability Nov 29 2007 11:46AM
3APA3A (3APA3A SECURITY NNOV RU) (1 replies)
Dear Rajesh Sethumadhavan,

In order to exploit this vulnerability you need to force victim to run
attacker-supplied BAT file. It's like forcing user to run
attacker-supplied .sh script under Unix. No vulnerability here, except
vulnerability in human. The second scenario is better. All you need is
to force user to type more than 1000 characters (including shellcode)
in filename without mistakes. You should be extremaly good social
engineer...

--Wednesday, November 28, 2007, 9:12:03 AM, you wrote to bugtraq (at) securityfocus (dot) com [email concealed]:

RS> Exploitation method:

RS> Method 1:
RS> -Send POC with payload to user.
RS> -Social engineer victim to open it.

RS> Method 2:
RS> -Attacker creates a directory with long folder or
RS> filename in his FTP server (should be other than IIS
RS> server)
RS> -Persuade victim to run the command "mget", "ls" or
RS> "dir" on specially crafted folder using microsoft ftp
RS> client
RS> -FTP client will crash and payload will get executed

RS> Proof Of Concept:
RS> http://www.xdisclose.com/poc/mget.bat.txt
RS> http://www.xdisclose.com/poc/username.bat.txt
RS> http://www.xdisclose.com/poc/directory.bat.txt
RS> http://www.xdisclose.com/poc/list.bat.txt

RS> Note: Modify POC to connect to lab FTP Server
RS> (As of now it will connect to
RS> ftp://xdisclose.com)

RS> Demonstration:
RS> Note: Demonstration leads to crashing of Microsoft FTP
RS> Client

RS> Download POC rename to .bat file and execute anyone of
RS> the batch file
RS> http://www.xdisclose.com/poc/mget.bat.txt
RS> http://www.xdisclose.com/poc/username.bat.txt
RS> http://www.xdisclose.com/poc/directory.bat.txt
RS> http://www.xdisclose.com/poc/list.bat.txt

RS> Solution:
RS> No Solution

RS> Screenshot:
RS> http://www.xdisclose.com/images/msftpbof.jpg

RS> Impact:
RS> Successful exploitation may allows execution of
RS> arbitrary code with privilege of currently logged in
RS> user.

RS> Impact of the vulnerability is system level.

RS> Original Advisory:
RS> http://www.xdisclose.com/advisory/XD100096.html

RS> Credits:
RS> Rajesh Sethumadhavan has been credited with the
RS> discovery of this vulnerability

RS> Disclaimer:
RS> This entire document is strictly for educational,
RS> testing and demonstrating purpose only. Modification
RS> use and/or publishing this information is entirely on
RS> your own risk. The exploit code/Proof Of Concept is to
RS> be used on test environment only. I am not liable for
RS> any direct or indirect damages caused as a result of
RS> using the information or demonstrations provided in
RS> any part of this advisory.

RS>
RS> ________________________________________________________________________
____________
RS> Be a better pen pal.
RS> Text or chat with friends inside Yahoo! Mail. See how. http://overview.mail.yahoo.com/

--
~/ZARAZA http://securityvulns.com/
Îñîáóþ ïðîáëåìó ñîñòàâëÿåò àëêîãîëèçì. (Ëåì)

[ reply ]
Re: Microsoft FTP Client Multiple Bufferoverflow Vulnerability Nov 29 2007 10:19PM
Valdis Kletnieks vt edu (3 replies)
Re[2]: Microsoft FTP Client Multiple Bufferoverflow Vulnerability Nov 30 2007 09:48AM
3APA3A (3APA3A SECURITY NNOV RU)
Re: Microsoft FTP Client Multiple Bufferoverflow Vulnerability Nov 30 2007 08:44AM
Vincent Archer (varcher denyall com)
Re: Microsoft FTP Client Multiple Bufferoverflow Vulnerability Nov 29 2007 11:09PM
Steve Shockley (steve shockley shockley net) (1 replies)
Re[2]: Microsoft FTP Client Multiple Bufferoverflow Vulnerability Nov 30 2007 12:18AM
Matthew Leeds (mleeds theleeds net)


 

Privacy Statement
Copyright 2010, SecurityFocus