CVE-2003-0766
CVSS7.5
发布时间 :2003-09-17 00:00:00
修订时间 :2016-10-17 22:37:16
NMCOE    

[原文]Multiple heap-based buffer overflows in FTP Desktop client 3.5, and possibly earlier versions, allow remote malicious servers to execute arbitrary code via (1) a long FTP banner, (2) a long response to a USER copmmand, or (3) a long response to a PASS command.


[CNNVD]FTP Desktop client多个基于堆的缓冲区溢出漏洞(CNNVD-200309-020)

        FTP Desktop client 3.5及其可能早期的版本存在多个基于堆的缓冲区溢出漏洞。远程恶意服务器借助(1)超长FTP banner,(2)USER命令的超长响应,或者(3)PASS命令的超长响应执行任意代码。

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0766
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2003-0766
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200309-020
(官方数据源) CNNVD

- 其它链接及资源

http://marc.info/?l=bugtraq&m=106305502230604&w=2
(UNKNOWN)  BUGTRAQ  20030908 Multiple Heap Overflows in FTP Desktop

- 漏洞信息

FTP Desktop client多个基于堆的缓冲区溢出漏洞
高危 缓冲区溢出
2003-09-17 00:00:00 2005-10-20 00:00:00
远程  
        FTP Desktop client 3.5及其可能早期的版本存在多个基于堆的缓冲区溢出漏洞。远程恶意服务器借助(1)超长FTP banner,(2)USER命令的超长响应,或者(3)PASS命令的超长响应执行任意代码。

- 公告与补丁

        

- 漏洞信息 (23117)

FTP Desktop 3.5 Banner Parsing Buffer Overflow Vulnerability (EDBID:23117)
windows dos
2003-09-08 Verified
0 Bahaa Naamneh
N/A [点击下载]
source: http://www.securityfocus.com/bid/8559/info

A buffer overflow vulnerability has been reported in FTP Desktop. The vulnerability occurs when FTP Desktop is parsing 'Welcome' banner 220 messages from remote FTP servers. When FTP Desktop receives an FTP banner exceeding a certain length, it will trigger the overflow condition. This could allow for execution of malicious code in the context of the affected FTP client. 

(FTP Desktop connected...)
PADDING EBP EIP
220 [229xA][4xB][4xX]
(Access violation when executing 0x58585858) // 4xX 		

- 漏洞信息 (23118)

FTP Desktop 3.5 FTP 331 Server Response Buffer Overflow Vulnerability (EDBID:23118)
windows dos
2003-09-08 Verified
0 Bahaa Naamneh
N/A [点击下载]
source: http://www.securityfocus.com/bid/8560/info

A buffer overflow vulnerability has been reported in FTP Desktop. The vulnerability occurs when FTP Desktop is parsing 331 server responses from remote FTP servers. When FTP Desktop receives an FTP 331 response exceeding a certain length, it will trigger the overflow condition. This could allow for execution of malicious code in the context of the affected FTP client.

Username:
---------
(FTP Desktop Sends 'USER username')
PADDING EBP EIP
331 [229xA][4xB][4xX]
(Access violation when executing 0x58585858) // 4xX

Password:
---------
(FTP Desktop Sends 'PASS password')
PADDING EBP EIP
331 [229xA][4xB][4xX]
(Access violation when executing 0x58585858) // 4xX 		

- 漏洞信息

10248
FTP Desktop Multiple Command Overflow
Input Manipulation
Loss of Integrity

- 漏洞描述

Unknown or Incomplete

- 时间线

2003-09-08 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete
 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站