Reported January 19, 2001, by Strumpf Noir

VERSIONS AFFECTED
  • FastStream FTP++ 2 Beta 10 Build 2

DESCRIPTION

Multiple vulnerabilities have been discovered in FastStream FTP++.  The first being a DoS attack where a malicious user can flood the FTP server by sending requests of 2048 bytes or greater.

The second vulnerability is a condition where a malicious user can browse and obtain directory listings outside of the FTP root directory.  A simple "ls C:\" would provide the user a directory listing of the C drive.

The final vulnerability lies in the storage of usernames and passwords.  FastStream stores the username and passwords in a file that is unencrypted.  Also, it seems that the USER and PASS commands are implemented for compatibility reasons only and the username and password file actually has no relevance to the logon process.

VENDOR RESPONSE

The vendor has been notified and has released a new BETA version of their software.  This version addresses the directory listing vulnerability but not the DoS attack or password issues.  Check the vendor web site for more information.

http://www.faststream.com

CREDIT
Discovered by
Strumpf Noir.