|Title:||Multiple FTP Servers vulnerabilities|
|Impact:||Remote code execution and DoS|
Multiple vendors contacted
Infigo IS released a simple GUI FTP fuzzer which can be downloaded from
http://www.infigo.hr/hr/in_focus/tools. An announcement which was posted to
multiple security groups included an overview of several vulnerabilities discovered
with the Fuzzer.
This advisory is published due to some misinterpretations in further reposts
discussing discovered vulnerabilities.
Vulnerabilities described in this advisory were found in the following FTP
server software products:
- ArgoSoft FTP Server
- Golden FTP Server
- War FTP Daemon
- Guild FTP Server
Fuzzing various FTP servers discovered numerous security flaws in the FTP server
software. Several of them are described below.
-[ ArgoSoft FTP Server buffer overflow
Multiple vulnerabilities were discovered in ArgoSoft FTP Server.
In a simple unicode buffer overflow in the 'RNTO' command with an argument size
of about 3000 with the fuzz string '&A', EIP will be overflowed with 0x00260047
(fuzzer input). This vulnerability allows remote code execution.
-[ Golden FTP Server buffer overflow
Among other vulnerabilities, Golden FTP Server discloses unnecessary
information. When an exception occurs in the server process, Golden FTP Server
will pass the exception code with detailed info on the exception to the FTP
client which caused it.
[ CMD: [CWD] FUZZ: [//A://A://A://A://A:] SIZE: 150 ]
RECV: 550 Access violation at address 004A291C in module 'GFTPpro.exe'.
Read of address 00000001
[ CMD: [CWD] FUZZ: [//A://A://A://A://A:] SIZE: 330 ]
RECV: 550 Access violation at address 00402CDF in module 'GFTPpro.exe'.
Read of address 2F3A412F
It is possible to obtain information on the process memory environment. In the
second exception, the process can't read from address 0x2F3A412F which
represents the string "/:A/" that was sent to the FTP server by the Fuzzer.
The exception is caused by a stack overflow in the NLST command when a long
argument with a specially constructed value is passed to it.
Exploiting the vulnerability is simple, because it is possible to overflow the
SEH handler and return to the 'pop-pop-ret' where the buffer is located.
This allows remote code execution, not just DoS as stated in some reposts.
-[ FileZilla vulnerabilities
A few vulnerabilities in FileZilla weren’t investigated beyond the crash. At
the moment there is no further information whether those vulnerabilities are
The first vulnerability is triggered by sending a long PORT or PASS command (30
bytes) and MLSD command after it. This causes FileZilla to crash (DoS).
The second vulnerability found in the FileZilla Server interface also leads to the
-[ War FTP Daemon WDM.exe overflow
Fuzzing the WarFTP Daemon raised multiple exceptions.
WDM.exe (Wardaemon Manager) will crash on "MOV DWORD PTR [EDX], ESI", where
the attacker controls EDX and ESI registers. This scenario could lead to remote
-[ Guild FTP Server buffer overflow
Fuzzing the Guild FTP Server discovered remote unicode buffer overflow probably
related to the 'globbing chars'. EIP is overflowed with the Fuzzer’s input. The issue
was not further investigated.
==[ Affected Version
Latest ArgoSoft FTP server (126.96.36.199), Golden FTP server (2.70), FileZilla (2.2.22),
WarFTP Daemon and Guild FTP Server (0.999.13).
==[ PoC Exploit
No PoC available.
Vulnerability discovered by Leon Juranic <firstname.lastname@example.org>.
==[ Revision history
2006-05-04, Original advisory published
Revision 01, 2006-05-05, Guild FTP Server vulnerability added