AUTHOR Komrade unsecure@xxxxxxxxxxxxxx http://unsecure.altervista.org
DATE 22/11/2004
PRODUCT WodFtpDLX is an ActiveX component that supports encrypted and non-encrypted FTP access to the servers for transferring files. It can be used in various programs, scripts, web applications to connect to FTP servers. The ActiveX is named "WodFtpDLX.ocx" and could be found on the default "windows\system32" directory (if installed by any application).
AFFECTED VERSION All verion prior to 2.3.2.97 (version fixed by the vendor)
Versions verified to be vulnerable: 2.2.0.1 2.3.0.0 2.3.2.90 2.3.2.94
DETAILS I discovered that this ActiveX doesn't correctly handle a very long file name sent from an FTP server. This vulnerability occurs when the ActiveX copies the name of the files stored in an FTP server in the stack, using a strncpy() function that not correctly sets the maximum length of the string. It is possible to overwrite a SEH address and cause an exception to the program, being able to execute arbitrary commands remotely to a target machine.
POC EXPLOIT You can find a proof of concept exploit that crashes all the programs based on the vulnerable ActiveX. http://unsecure.altervista.org/security/wodftpcrash.c
VENDOR STATUS I notified this vulnerability to the vendor on 18/11/2004 and they create a new fixed version of the ActiveX. See http://weonlydo.com to download the new fixed verion.
VULNERABILITY TIMELINE 16/11/2004 Vulnerbility found. 18/11/2004 Vendor contacted for the first time. 18/11/2004 Vendor reply. 19/11/2004 Vulnerability fixed. A new version is now avaible. 22/11/2004 Public disclosure.
-- - Unsecure Programs - - http://unsecure.altervista.org -
- Vulnerabilities and exploits - - http://unsecure.altervista.org/security.htm -