vendor:
MiniFtp
by:
strider
7.8
CVSS
HIGH
Buffer Overflow
119
CWE
Product Name: MiniFtp
Affected Version From: Unknown
Affected Version To: Unknown
Patch Exists: NO
Related CWE: None
CPE: None
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: Debian 9 Stretch i386/ Kali Linux i386
2019
MiniFtp parseconf_load_setting local-bufferoverflow (318 bytes)
This exploit spawns a shell with root privileges. The exploit will be written into the file miniftpd.conf. The given var settings is a *char and will be splitted into key and value key and value are both 128 char long and settings can be longer than 128 + 128 chars. This issue will not be checked and stored. This causes a buffer overflow.
Mitigation:
Check the length of the input before storing it in the buffer.