[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Full-Disclosure] ProFtp bufferoverflow.



On Thursday 04 March 2004 20:44, Epic wrote:
> Isn't
>
> "The vulnerability is caused due to a boundary error in the ASCII file
> transfer component when translating newline characters. This can be
> exploited to cause a buffer overflow by uploading and then downloading a
> specially crafted file."
>
> And.
>
>
> "The vulnerability is caused due to two off-by-one errors in the
> "_xlate_ascii_write()" function. These can be exploited by sending a
> specially crafted "RETR" FTP command with a 1023 bytes long argument
> starting with a linefeed character."
>
> Different?
>
> I am not expert, and was wondering If this was actually something new in
> the same ASCII File translation.?

i really don't think the vuln is new. The advisory you sent says proftpd < 
1.2.9rc3 is vulnerable. 1.2.9rc3 was exactly the version THIS BUG was fixed.

>
> Epic
>

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html