Korean
<< Back
VID 12021
Severity 40
Port 21
Protocol TCP
Class FTP
Detailed Description The War-FTPD daemon is vulnerable to a buffer overflow attack via USER or PASS command.
War-FTPD daemon is very popular FTP server released as freeware, written for personal and professional use on Windows platform. In Some versions, a very bad buffer overflow arises due to handling the USER and PASS commands improperly. A remote attacker can issue the following commands with very long string to exploit War-FTPD daemon.

USER aaaaaa...['a'*5000]...aaaaaaaa (very long string)
or
PASS aaaaaa...['a'*5000]...aaaaaaaa (very long string)

It can allow the remote attacker to overflow a buffer and execute arbitrary code on the server, or crash the FTP server simply.

* Platforms Affected:
War-FTPD 1.65 and earlier versions
War-FTPD 1.66x3 and earlier versions

* References:
http://online.securityfocus.com/archive/1/8483
http://www.iss.net/security_center/static/345.php
Recommendation Upgrade to the latest version of War-FTPD(1.70beta or later), available from the Jgaa's web site : http://support.jgaa.com
Now the latest version, War-FTPD 1.81.3 version, was released on December 19, 2002.
Related URL CVE-1999-0256 (CVE)
Related URL (SecurityFocus)
Related URL (ISS)