Korean
<< Back
VID 16110
Severity 40
Port 21
Protocol TCP
Class FTP
Detailed Description The Crob FTP Server, according to its banner, has two buffer overflow vulnerabilities. Crob FTP Server is a FTP server for Microsoft Windows operating systems. Crob FTP Server version 3.6.1 and earlier versions are vulnerable to two buffer overflow vulnerabilities, which can be exploited by a remote authenticated attacker to execute arbitrary code within the context of the affected service:

1) A boundary error in the argument handling can be exploited to cause a stack-based buffer overflow by e.g. sending the "STOR" command followed by the "RMD" command with specially crafted overly long arguments.
2) A boundary error in the handling of certain characters can be exploited to cause a heap-based buffer overflow by sending e.g. the "LIST" or "NLST" command with a specially crafted overly long argument.

* Note: This check solely relied on the banner of the remote FTP server to assess this vulnerability, so this might be a false positive. Although the version is 3.6.1 and the build is 263 or later, this check will alert as a positive, and in this case, please ignore the alert.

* References:
http://secunia.com/advisories/15585/
http://security.lss.hr/en/index.php?page=details&ID=LSS-2005-06-06

* Platforms Affected:
Crob Software Studio, Crob FTP Server version 3.6.1 and earlier versions
Microsoft Windows Any version
Recommendation Upgrade to the latest version of Crob FTP Server (3.6.1 build 263 or later), available from the Crob FTP Server Web site at http://crob.net/studio/ftpserver_cn/index.html
Related URL CVE-2005-1873 (CVE)
Related URL 13847,13848 (SecurityFocus)
Related URL 20876,20877 (ISS)