FastStream FTP++ Subject to Weak Passwords, Directory Traversal, and DoS

Multiple vulnerabilities have been discovered in FastStream FTP++.

Steve Manzuik

January 18, 2001

1 Min Read
ITPro Today logo in a gray background | ITPro Today

ReportedJanuary 19, 2001, by Strumpf Noir.

VERSIONS AFFECTED

  • FastStream FTP++ 2 Beta 10 Build 2

DESCRIPTION

Multiple vulnerabilities have been discovered in FastStream FTP++. Thefirst vulnerability creates a Denial of Service (DoS) attack. A malicious usercan flood the FTP server by sending requests of 2048 bytes or greater.

In the second vulnerability, a malicious user canbrowse and obtain directory listings outside the FTP root directory. Forexample, a user can input Is C: to obtain a directory listing of the C drive.

The final vulnerability is the result of FastStreamstoring usernames and passwords in an unencrypted file. The program appears toimplement the USER and PASS commands for compatibility reasons only, and theusername and password file actually has no relevance to the logon process.

VENDOR RESPONSE

The vendor has been notified and has released a newbeta version of its software. This version addresses the directory listingvulnerability but not the DoS attack or password issues. Check the vendor'sWeb site for more information:

http://www.faststream.com

CREDIT
Discovered byStrumpf Noir.

Sign up for the ITPro Today newsletter
Stay on top of the IT universe with commentary, news analysis, how-to's, and tips delivered to your inbox daily.

You May Also Like