FastStream FTP++ Subject to Weak Passwords, Directory Traversal, and DoS
Multiple vulnerabilities have been discovered in FastStream FTP++.
January 18, 2001
ReportedJanuary 19, 2001, by Strumpf Noir.
VERSIONS AFFECTED
FastStream FTP++ 2 Beta 10 Build 2
DESCRIPTION
Multiple vulnerabilities have been discovered in FastStream FTP++. Thefirst vulnerability creates a Denial of Service (DoS) attack. A malicious usercan flood the FTP server by sending requests of 2048 bytes or greater.
In the second vulnerability, a malicious user canbrowse and obtain directory listings outside the FTP root directory. Forexample, a user can input Is C: to obtain a directory listing of the C drive.
The final vulnerability is the result of FastStreamstoring usernames and passwords in an unencrypted file. The program appears toimplement the USER and PASS commands for compatibility reasons only, and theusername and password file actually has no relevance to the logon process.
VENDOR RESPONSE
The vendor has been notified and has released a newbeta version of its software. This version addresses the directory listingvulnerability but not the DoS attack or password issues. Check the vendor'sWeb site for more information:
CREDIT
Discovered byStrumpf Noir.
About the Author
You May Also Like