Buffer Overrun in Enceladus Web Server for Windows

Reported November 26, 2002, by Tamir Sahin.


  • Enceladus Web and FTP Server Suite Version 3.9


A buffer overrun vulnerability in Enceladus Web and FTP Server Suite Version 3.9 can permit an attacker to execute arbitrary code on the vulnerable system. If an attacker supplies a long sequence of characters as an argument to the CD command, thereby exceeding the length of the input buffer, the excess data will overwrite other variables on the stack and the stack frame. An execution of arbitrary code can result from this scenario. For more specific details about each of these vulnerabilities, see the discoverer’s Web site.


The discoverer posted the following scenario as proof of concept:

[email protected]:~$ ftp

Connected to

220 Mollensoft FTP Server Ready.

Name ( anonymous

331 Password required for anonymous.


230 User anonymous logged in.

Remote system type is UNIX.

Using binary mode to transfer files.

ftp> ls

500 'EPSV': command not understood.

227 Entering Passive Mode (192,168,10,2,6,160)

150 Data connection open for PASV transfer.

- -rwxr-xr-x 1 User Group 6468 Feb 17 01:13 index.html

- -rwxr-xr-x 1 User Group 70 Oct 31 04:52 readme.txt

226 Listing complete.

ftp> cd


421 Service not available, remote server has closed connection.


Mollensoft Software has been notified but hasn't yet released a patch for this problem.


Discovered by Tamer Sahin.

TAGS: Security
Hide comments


  • Allowed HTML tags: <em> <strong> <blockquote> <br> <p>

Plain text

  • No HTML tags allowed.
  • Web page addresses and e-mail addresses turn into links automatically.
  • Lines and paragraphs break automatically.