FTP: Command NOOP Sled Overflow

This signature detects attempts to exploit buffer overflow vulnerabilities against multiple FTP servers. Attackers can send long strings of NOOPs to overwrite the return address and gain control of the affected system. A successful attack can lead to arbitrary code execution.

Extended Description

A buffer overflow vulnerability has been confirmed in version 1.0.13 of Max-Wilhelm Bruker's FTP server BFTPD. The program fails to properly validate user-supplied input argumenting the SITE CHOWN command. An attacker could send a maliciously-formed string of characters following this command which exceeds the maximum length of the input buffer. The values stored in this buffer can overflow onto the stack, potentially overwriting the calling functions' return address with values that can alter the program's flow of execution. This could result in a remote attacker gaining root access on the target host.

Affected Products

Max-wilhelm_bruker bftpd

Short Name
FTP:OVERFLOW:CMD-NOOP-SLED
Severity
Major
Recommended
False
Recommended Action
None
Category
FTP
Keywords
CVE-2001-0065 Command NOOP Overflow Sled bid:2120 bid:48704 bid:49427 bid:49444
Release Date
04/24/2003
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3375
False Positive
Unknown
Vendors

Max-wilhelm_bruker

CVSS Score

10.0

Found a potential security threat?