Metasploit mailing list archives

WFTPD Server 3.23 SIZE Command Buffer Overflow


From: msf-list at jervus.it (msf-list at jervus.it)
Date: Wed, 27 Dec 2006 12:55:13 +0000

oooooops !!  thank's str0ke; the module is for the version 3.23 .....this is a beer overflow :-))

I've re-attached the module.

Ciao
Jacopo acaro



Da: str0ke <str0ke at milw0rm.com>
Data: Tue, 26 Dec 2006 11:25:24 -0600
A: framework at metasploit.com
Oggetto:

How goes it acaro,

The version information stated in the exploit code is for 2.23 but the
advisories associated with the SIZE overflow vulnerability are for
versions 3.23.  I just wanted to make sure the version information was
correct, or maybe your testing was on an older version?

Regards,
/str0ke

On 12/26/06, msf-list at jervus.it <msf-list at jervus.it> wrote:
Hi list!

I've attached a module for WFTPD Server 2.23 SIZE Command Buffer Overflow.

Ciao
acaro





-------------- next part --------------
A non-text attachment was scrubbed...
Name: wftpd_size_overflow.pm
Type: application/octet-stream
Size: 3923 bytes
Desc: not available
URL: <http://mail.metasploit.com/pipermail/framework/attachments/20061227/bc5ece6f/attachment.obj>


Current thread: