• RSS
  • Twitter
  • FaceBook

Security Forums

Log in

FAQ | Search | Usergroups | Profile | Register | RSS | Posting Guidelines | Recent Posts

Buffer Overflow by a long path name

Users browsing this topic:0 Security Fans, 0 Stealth Security Fans
Registered Security Fans: None
Post new topic   Reply to topic   Printer-friendly version    Networking/Security Forums Index -> Exploits // System Weaknesses

View previous topic :: View next topic  
Author Message
zombie2
Just Arrived
Just Arrived


Joined: 03 May 2010
Posts: 0


Offline

PostPosted: Mon May 03, 2010 6:25 pm    Post subject: Buffer Overflow by a long path name Reply with quote

I am working on this exploit http://milworm.ru/exploits/1295
The vulnerability is exploited by creating multiple levels of sub-directories with long names on ftp server, and then issuing the "XPWD" command when at the lowest level sub-directory.
The resulting path name that is generated in response to the "XPWD" command will exceed 2048 bytes, thus overflowing the stack-buffer.
What i cannot understand is how the code is injected in the file path.
Please help!!
[/b]
Back to top
View user's profile Send private message
Display posts from previous:   

Post new topic   Reply to topic   Printer-friendly version    Networking/Security Forums Index -> Exploits // System Weaknesses All times are GMT + 2 Hours
Page 1 of 1


 
Jump to:  
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum

Community Area

Log in | Register