Document Title: =============== UltraFXP v1.07 - Stack Buffer Overflow Vulnerability Release Date: ============= 2011-06-19 Vulnerability Laboratory ID (VL-ID): ==================================== 162 Product & Service Introduction: =============================== FTP-Client / FXP-Client (Server-zu-Server) der Spitzenklasse. Verbinden sie sich mit 10 FTP-Servern gleichzeitig und übertragen Dateien, ohne den Umweg über den eigenen Rechner. Verschlüsseltes FTP (SSL), Scripting-Unterstützung und natürlich ganz normales FTP. (Copy of the Vendor Homepage: http://www.soft-ware.net) Abstract Advisory Information: ============================== Vulnerability-Lab Team discovered a Stack-Overflow Vulnerability on UltraFXP v1.07 for Windows. Vulnerability Disclosure Timeline: ================================== 2011-06-20: Public or Non-Public Disclosure Discovery Status: ================= Published Affected Product(s): ==================== Exploitation Technique: ======================= Remote Severity Level: =============== Critical Technical Details & Description: ================================ A stack buffer overflow vulnerability is detected on UltraFXP v1.07.x. The Vulnerability is located in the Manueller Download mask of the Interface on Arbeitsplatz. The Bug allows an attacker to overwrite the EIP register. Successfull exploitation of The bug may allow an attacker escalate out of the affected proccess with the same system privileges. Vulnerable Module(s): [+] Manueller Download Proof of Concept (PoC): ======================= The vulnerability can be exploited by local attackers. For demonstration or reproduce ... --- Error Logs --- Problemereignisame: APPCRASH Anwendungsname: UltraFxp.exe Anwendungsversion: 0.0.0.0 Anwendungszeitstempel: 2a425e19 Fehlermodulname: StackHash_e52f Fehlermodulversion: 0.0.0.0 Fehlermodulzeitstempel: 00000000 Ausnahmecode: c0000005 Ausnahmeoffset: 41414141 Betriebsystemversion: 6.0.6002.2.2.0.768.3 Gebietsschema-ID: 1031 Zusatzinformation 1: e52f Zusatzinformation 2: e98dfca8bcf81bc1740adb135579ad53 Zusatzinformation 3: 860f Zusatzinformation 4: 6eabdd9e0dc94904be3b39a1c0583635 Registers (FPU) EAX=000017BF ECX=7C91056D EDX=00150608 EBX=41414141 ESP=0012F96C EBP=0012F9AC ESI=9A011112 EIP=41414141 Pictures: ../stack-overflow.png ../stack-overflow2.png ../stack-overflow3.png Security Risk: ============== The security risk of the stack buffer overflow vulnerability is estimated as critical. Credits & Authors: ================== Rem0ve Disclaimer & Information: ========================= The information provided in this advisory is provided as it is without any warranty. Vulnerability-Lab disclaims all warranties, either expressed or implied, including the warranties of merchantability and capability for a particular purpose. Vulnerability- Lab or its suppliers are not liable in any case of damage, including direct, indirect, incidental, consequential loss of business profits or special damages, even if Vulnerability-Lab or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply. We do not approve or encourage anybody to break any vendor licenses, policies, deface websites, hack into databases or trade with fraud/stolen material. Domains: www.vulnerability-lab.com - www.vuln-lab.com - www.vulnerability-lab.com/register Contact: admin@vulnerability-lab.com - support@vulnerability-lab.com - research@vulnerability-lab.com Section: video.vulnerability-lab.com - forum.vulnerability-lab.com - news.vulnerability-lab.com Social: twitter.com/#!/vuln_lab - facebook.com/VulnerabilityLab - youtube.com/user/vulnerability0lab Feeds: vulnerability-lab.com/rss/rss.php - vulnerability-lab.com/rss/rss_upcoming.php - vulnerability-lab.com/rss/rss_news.php Any modified copy or reproduction, including partially usages, of this file requires authorization from Vulnerability Laboratory. Permission to electronically redistribute this alert in its unmodified form is granted. All other rights, including the use of other media, are reserved by Vulnerability-Lab Research Team or its suppliers. All pictures, texts, advisories, sourcecode, videos and other information on this website is trademark of vulnerability-lab team & the specific authors or managers. To record, list (feed), modify, use or edit our material contact (admin@vulnerability-lab.com or support@vulnerability-lab.com) to get a permission. Copyright © 2012 | Vulnerability Laboratory