Short Name |
FTP:OVERFLOW:CMD-NOOP-SLED |
---|---|
Severity |
Major |
Recommended |
No |
Category |
FTP |
Keywords |
Command NOOP Sled Overflow |
Release Date |
2003/04/23 |
Update Number |
1213 |
Supported Platforms |
idp-4.0+, isg-3.4+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+ |
This signature detects attempts to exploit buffer overflow vulnerabilities against multiple FTP servers. Attackers can send long strings of NOOPs to overwrite the return address and gain control of the affected system. A successful attack can lead to arbitrary code execution.
A buffer overflow vulnerability has been confirmed in version 1.0.13 of Max-Wilhelm Bruker's FTP server BFTPD. The program fails to properly validate user-supplied input argumenting the SITE CHOWN command. An attacker could send a maliciously-formed string of characters following this command which exceeds the maximum length of the input buffer. The values stored in this buffer can overflow onto the stack, potentially overwriting the calling functions' return address with values that can alter the program's flow of execution. This could result in a remote attacker gaining root access on the target host.