Neohapsis is currently accepting applications for employment. For more information, please visit our website www.neohapsis.com or email firstname.lastname@example.org
Re: [Full-Disclosure] ProFtp bufferoverflow.
From: Andreas Gietl (a.gietle-admin.de)
Date: Thu Mar 04 2004 - 17:35:27 CST
On Thursday 04 March 2004 20:44, Epic wrote:
> "The vulnerability is caused due to a boundary error in the ASCII file
> transfer component when translating newline characters. This can be
> exploited to cause a buffer overflow by uploading and then downloading a
> specially crafted file."
> "The vulnerability is caused due to two off-by-one errors in the
> "_xlate_ascii_write()" function. These can be exploited by sending a
> specially crafted "RETR" FTP command with a 1023 bytes long argument
> starting with a linefeed character."
> I am not expert, and was wondering If this was actually something new in
> the same ASCII File translation.?
i really don't think the vuln is new. The advisory you sent says proftpd <
1.2.9rc3 is vulnerable. 1.2.9rc3 was exactly the version THIS BUG was fixed.
Full-Disclosure - We believe in it.