Neohapsis is currently accepting applications for employment. For more information, please visit our website www.neohapsis.com or email firstname.lastname@example.org
WeOnlyDo! COM Ftp DELUXE ActiveX Control Buffer Overflow Vulnerability
From: Komrade (unsecurealtervista.org)
Date: Mon Nov 22 2004 - 08:37:57 CST
WodFtpDLX is an ActiveX component that supports encrypted and
non-encrypted FTP access to the servers for transferring files.
It can be used in various programs, scripts, web applications to connect
to FTP servers.
The ActiveX is named "WodFtpDLX.ocx" and could be found on the default
"windows\system32" directory (if installed by any application).
All verion prior to 18.104.22.168 (version fixed by the vendor)
Versions verified to be vulnerable:
I discovered that this ActiveX doesn't correctly handle a very long file
name sent from an FTP server.
This vulnerability occurs when the ActiveX copies the name of the files
stored in an FTP server in the stack, using a strncpy() function that
not correctly sets the maximum length of the string.
It is possible to overwrite a SEH address and cause an exception to the
program, being able to execute arbitrary commands remotely to a target
You can find a proof of concept exploit that crashes all the programs
based on the vulnerable ActiveX.
I notified this vulnerability to the vendor on 18/11/2004 and they
create a new fixed version of the ActiveX.
See http://weonlydo.com to download the new fixed verion.
16/11/2004 Vulnerbility found.
18/11/2004 Vendor contacted for the first time.
18/11/2004 Vendor reply.
19/11/2004 Vulnerability fixed. A new version is now avaible.
22/11/2004 Public disclosure.
- Unsecure Programs -
- http://unsecure.altervista.org -
- Vulnerabilities and exploits -
- http://unsecure.altervista.org/security.htm -