ID

VAR-E-201002-0428


TITLE

uplusware UplusFtp Multiple Remote Buffer Overflow Vulnerabilities

Trust: 0.3

sources: BID: 38102

DESCRIPTION

UplusFtp (formerly Easy Ftp Server) is prone to multiple remote buffer-overflow vulnerabilities.
Attackers can exploit these issues to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition.
UplusFtp 1.7.0.12 is vulnerable; prior versions, including Easy Ftp Server, may also be affected.

Trust: 0.3

sources: BID: 38102

AFFECTED PRODUCTS

vendor:upluswaremodel:uplusftpscope:eqversion:1.7.12

Trust: 0.3

vendor:easymodel:ftp server easy ftp serverscope:eqversion:1.72

Trust: 0.3

vendor:easymodel:ftp server easy ftp serverscope:eqversion:1.7.0.11

Trust: 0.3

sources: BID: 38102

EXPLOIT

Core Security Technologies has developed a working commercial exploit for its CORE IMPACT product. This exploit is not otherwise publicly available or known to be circulating in the wild.
The following exploits and proofs of concept are available:
Bullet list:
<li><a href="/data/vulnerabilities/exploits/38102.py">/data/vulnerabilities/exploits/38102.py</a></li>
<li><a href="/data/vulnerabilities/exploits/38262-1.py">/data/vulnerabilities/exploits/38262-1.py</a></li>
<li><a href="/data/vulnerabilities/exploits/38262-2.py">/data/vulnerabilities/exploits/38262-2.py</a></li>
<li><a href="/data/vulnerabilities/exploits/38262-3.py">/data/vulnerabilities/exploits/38262-3.py</a></li>
<li><a href="/data/vulnerabilities/exploits/38262-4.py">/data/vulnerabilities/exploits/38262-4.py</a></li>
<li><a href="/data/vulnerabilities/exploits/38102.rb">/data/vulnerabilities/exploits/38102.rb</a></li>
<li><a href="/data/vulnerabilities/exploits/38102.sh">/data/vulnerabilities/exploits/38102.sh</a></li>
<li><a href="/data/vulnerabilities/exploits/38102-2.py">/data/vulnerabilities/exploits/38102-2.py</a></li>
<li><a href="/data/vulnerabilities/exploits/38102-3.py">/data/vulnerabilities/exploits/38102-3.py</a></li>
<li><a href="/data/vulnerabilities/exploits/38102-5.py">/data/vulnerabilities/exploits/38102-5.py</a></li>

Trust: 0.3

sources: BID: 38102

PRICE

Free

Trust: 0.3

sources: BID: 38102

TYPE

Boundary Condition Error

Trust: 0.3

sources: BID: 38102

CREDITS

loneferret

Trust: 0.3

sources: BID: 38102

EXTERNAL IDS

db:BIDid:38102

Trust: 0.3

sources: BID: 38102

REFERENCES

url:http://www.uplusware.com/blog/post/7.html

Trust: 0.3

url:http://www.erisesoft.com/en/uplusftp.php

Trust: 0.3

url:http://sourceforge.net/projects/easyftpsvr/

Trust: 0.3

sources: BID: 38102

SOURCES

db:BIDid:38102

LAST UPDATE DATE

2022-07-27T09:28:11.746000+00:00


SOURCES UPDATE DATE

db:BIDid:38102date:2011-06-02T06:00:00

SOURCES RELEASE DATE

db:BIDid:38102date:2010-02-04T00:00:00