CVE-2006-3768
CVSS6.4
发布时间 :2006-07-28 19:04:00
修订时间 :2011-03-07 21:39:25
NMCOPS    

[原文]Integer underflow in filecpnt.exe in FileCOPA FTP Server 1.01 before 2006-07-21 allow remote authenticated users to execute arbitrary code via a long argument to the (1) CWD, (2) DELE, (3) MDTM, and (4) MKD commands, which triggers a stack-based buffer overflow.


[CNNVD]FileCOPA目录相关命令参数缓冲区处理溢出漏洞(CNNVD-200607-501)

        FileCopa是一款自动化的FTP服务器软件。
        FileCopa在处理请求命令参数时存在缓冲区溢出漏洞,远程攻击者可能利用此漏洞在服务器上执行任意指令。
        FileCopa的FTP服务(filecpnt.exe)在处理传送给某些目录相关的FTP命令(如CWD、DELE、MDTM或MKD)的参数时存在整数溢出,攻击者可以向受影响的FTP命令传送特制的超长参数触发栈溢出,导致执行任意指令。

- CVSS (基础分值)

CVSS分值: 6.4 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3768
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-3768
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200607-501
(官方数据源) CNNVD

- 其它链接及资源

http://www.kb.cert.org/vuls/id/713092
(UNKNOWN)  CERT-VN  VU#713092
http://www.securityfocus.com/bid/19153
(PATCH)  BID  19153
http://www.securityfocus.com/archive/1/archive/1/441207/100/0/threaded
(PATCH)  BUGTRAQ  20060725 Secunia Research: FileCOPA Directory Argument Handling BufferOverflow
http://secunia.com/advisories/21097
(VENDOR_ADVISORY)  SECUNIA  21097
http://xforce.iss.net/xforce/xfdb/27941
(UNKNOWN)  XF  filecopa-ftp-dir-bo(27941)
http://www.vupen.com/english/advisories/2006/2960
(UNKNOWN)  VUPEN  ADV-2006-2960
http://secunia.com/secunia_research/2006-55/advisory/
(VENDOR_ADVISORY)  MISC  http://secunia.com/secunia_research/2006-55/advisory/
http://www.osvdb.org/27486
(UNKNOWN)  OSVDB  27486
http://www.kb.cert.org/vuls/id/RGII-6TYN6M
(UNKNOWN)  CONFIRM  http://www.kb.cert.org/vuls/id/RGII-6TYN6M
http://securityreason.com/securityalert/1300
(UNKNOWN)  SREASON  1300

- 漏洞信息

FileCOPA目录相关命令参数缓冲区处理溢出漏洞
中危 缓冲区溢出
2006-07-28 00:00:00 2006-08-01 00:00:00
远程  
        FileCopa是一款自动化的FTP服务器软件。
        FileCopa在处理请求命令参数时存在缓冲区溢出漏洞,远程攻击者可能利用此漏洞在服务器上执行任意指令。
        FileCopa的FTP服务(filecpnt.exe)在处理传送给某些目录相关的FTP命令(如CWD、DELE、MDTM或MKD)的参数时存在整数溢出,攻击者可以向受影响的FTP命令传送特制的超长参数触发栈溢出,导致执行任意指令。

- 公告与补丁

        目前厂商还没有提供补丁或者升级程序,建议使用此软件的用户随时关注厂商的主页以获取最新版本:
        http://www.filecopa.com/

- 漏洞信息 (F48580)

secunia-FileCOPA.txt (PacketStormID:F48580)
2006-07-26 00:00:00
Carsten Eiram  secunia.com
advisory,overflow,arbitrary
CVE-2006-3768
[点击下载]

Secunia Research has discovered a vulnerability in FileCOPA, which can be exploited by malicious users to compromise a vulnerable system. The vulnerability is caused due to an integer underflow error in the FTP service (filecpnt.exe) when processing directory arguments passed to certain FTP commands (e.g. "CWD", "DELE", "MDTM", and "MKD"). This can be exploited to cause a stack-based buffer overflow by passing a specially crafted, overly long argument to one of the affected FTP commands. Successful exploitation allows execution of arbitrary code. Versions below 1.01 are affected.

====================================================================== 

                     Secunia Research 25/07/2006

      - FileCOPA Directory Argument Handling Buffer Overflow -

====================================================================== 
Table of Contents

Affected Software....................................................1
Severity.............................................................2
Vendor's Description of Software.....................................3
Description of Vulnerability.........................................4
Solution.............................................................5
Time Table...........................................................6
Credits..............................................................7
References...........................................................8
About Secunia........................................................9
Verification........................................................10

====================================================================== 
1) Affected Software 

FileCOPA 1.01 released 2006-07-18.

NOTE: Other versions may also be affected.

====================================================================== 
2) Severity 

Rating: Moderate (High with anonymous access enabled)
Impact: System compromise
Where:  Remote

====================================================================== 
3) Vendor's Description of Software 

"FileCOPA takes the hard work out of running an FTP Server. The
FileCOPA FTP Server Software installs on any version of the Microsoft
Windows operating system with just a few clicks of the mouse and
automatically configures itself for anonymous operation."

Product Link:
http://www.filecopa.com/

====================================================================== 
4) Description of Vulnerability

Secunia Research has discovered a vulnerability in FileCOPA, which can
be exploited by malicious users to compromise a vulnerable system.

The vulnerability is caused due to an integer underflow error in the
FTP service (filecpnt.exe) when processing directory arguments passed
to certain FTP commands (e.g. "CWD", "DELE", "MDTM", and "MKD"). This
can be exploited to cause a stack-based buffer overflow by passing a
specially crafted, overly long argument to one of the affected FTP 
commands.

Successful exploitation allows execution of arbitrary code.

====================================================================== 
5) Solution 

Update to version 1.01 released 2006-07-21.

====================================================================== 
6) Time Table 

21/07/2006 - Vendor notified.
21/07/2006 - Vendor response.
25/07/2006 - Public disclosure.

====================================================================== 
7) Credits 

Discovered by Carsten Eiram, Secunia Research.

====================================================================== 
8) References

The Common Vulnerabilities and Exposures (CVE) project has assigned 
CVE-2006-3768 for the vulnerability.

====================================================================== 
9) About Secunia 

Secunia collects, validates, assesses, and writes advisories regarding 
all the latest software vulnerabilities disclosed to the public. These 
advisories are gathered in a publicly available database at the 
Secunia website:

http://secunia.com/

Secunia offers services to our customers enabling them to receive all 
relevant vulnerability information to their specific system 
configuration. 

Secunia offers a FREE mailing list called Secunia Security Advisories: 

http://secunia.com/secunia_security_advisories/

====================================================================== 
10) Verification 

Please verify this advisory by visiting the Secunia website:
http://secunia.com/secunia_research/2006-55/

Complete list of vulnerability reports published by Secunia Research:
http://secunia.com/secunia_research/

======================================================================




_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
    

- 漏洞信息

27486
FileCOPA FTP Multiple Command Directory Argument Overflow
Remote / Network Access Input Manipulation
Loss of Integrity Upgrade
Exploit Private RBS Confirmed, Vendor Verified, Coordinated Disclosure

- 漏洞描述

A remote overflow exists in FileCOPA FTP server. The product fails to perform correct boundary checks on directory names such as 'CWD', 'DELE', 'MDTM', and 'MKD' when processing a client's command, resulting in a integer underflow. With a specially crafted command, an attacker can cause arbitrary code execution resulting in a loss of integrity.

- 时间线

2006-07-25 Unknow
Unknow 2006-07-25

- 解决方案

Upgrade to version 1.01 (2006-07-18) or higher, as it has been reported to fix this vulnerability. Note that this flaw was fixed in the 2006-07-18 release without a change in version number. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

- 漏洞信息

Intervations FileCopa Directory Arguments Mutiple Buffer Overflow Vulnerabilities
Boundary Condition Error 19153
Yes No
2006-07-25 12:00:00 2006-07-27 06:07:00
Carsten Eiram from Secunia Research is credited with the discovery of these vulnerabilities.

- 受影响的程序版本

Intervations FileCopa FTP Server 1.01.-2006-02-19
Intervations FileCopa FTP Server 1.01.-2005-11-21
Intervations FileCopa FTP Server 1.01 (2006-07-18)
Intervations FileCopa FTP Server 1.01 (2006-04-06)
Intervations FileCopa FTP Server 1.01
Intervations FileCopa FTP Server 1.01 -2006-07-21

- 不受影响的程序版本

Intervations FileCopa FTP Server 1.01 -2006-07-21

- 漏洞讨论

FileCopa is prone to multiple buffer-overflow vulnerabilities because the application fails to properly bounds-check user-supplied input before copying it to insufficiently sized memory buffers.

Successful exploits may allow remote attackers to execute arbitrary machine code in the context of the affected application, which may facilitate the remote compromise of affected computers.


FileCOPA 1.01 version 2006-07-18 is vulnerable; other versions may also be affected.

- 漏洞利用

Attackers may exploit these issues with an FTP client.

- 解决方案

The vendor released version 1.01- 2006-07-21 to address these issues. Please see the references for more information.

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站