Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

This site is deprecated. Please CLICK HERE for latest updates

Short Name

FTP:OVERFLOW:CMD-NOOP-SLED

Severity

Major

Recommended

No

Category

FTP

Keywords

Command NOOP Sled Overflow

Release Date

2003/04/23

Update Number

1213

Supported Platforms

idp-4.0+, isg-3.4+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+

FTP: Command NOOP Sled Overflow


This signature detects attempts to exploit buffer overflow vulnerabilities against multiple FTP servers. Attackers can send long strings of NOOPs to overwrite the return address and gain control of the affected system. A successful attack can lead to arbitrary code execution.

Extended Description

A buffer overflow vulnerability has been confirmed in version 1.0.13 of Max-Wilhelm Bruker's FTP server BFTPD. The program fails to properly validate user-supplied input argumenting the SITE CHOWN command. An attacker could send a maliciously-formed string of characters following this command which exceeds the maximum length of the input buffer. The values stored in this buffer can overflow onto the stack, potentially overwriting the calling functions' return address with values that can alter the program's flow of execution. This could result in a remote attacker gaining root access on the target host.

Affected Products

  • Max-wilhelm_bruker bftpd 1.0.13

References

  • BugTraq: 2120
  • BugTraq: 48704
  • BugTraq: 49444
  • BugTraq: 49427
  • CVE: CVE-2001-0065
  • URL: http://archives.neohapsis.com/archives/bugtraq/2000-12/0189.html

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out