Problem:
UssrLabs found a Remote DoS Attack in TransSoft's
Broker Ftp v3.5, the buffer overflow is caused by a long user
name 2730 characters.
If TransSoft's Broker Ftp Server is running as
a service the service will start eating all memory and all computer
resource CPU 100%,
at the moment of no more memory, if this happend
all system is down :(
Example:
[cham@guilt cham]$ telnet example.com 21
Trying example.com...
Connected to example.com.
Escape character is '^]'.
FTP SERVER READY
User [buffer]
Where [buffer] is aprox. 2730 characters. At his
point the server overflows
Published by: USSR Labs
u n d e r g r o u n d s e c u r i t y s y s t e
m s r e s e a r c h
|