exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

hyperion.txt

hyperion.txt
Posted Nov 13, 2002
Authored by Tamer Sahin | Site securityoffice.net

The Hyperion FTP Server for Windows 95/98/NT/2000 has a vulnerability which allows remote attackers to traverse through directories of a target host. Versions tested against that are vulnerable are Hyperion Ftp Server v2.8.1 / Windows 2000 sp3 and Hyperion Ftp Server v2.8.1 / Windows 98 SE.

tags | remote
systems | windows
SHA-256 | f2e3dc440c3dc9d6c71656d2e0914613fa308ff83b4f72614aed8ac43457c54e

hyperion.txt

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: MD5

- --[ Hyperion Ftp Server v2.8.1 Directory Traversal Vulnerability ]--

- --[ Type

Directory Traversal

- --[ Release Date

November 12, 2002

- --[ Product / Vendor

Hyperion FTP Server is a powerful, reliable FTP server for Windows 95/98/NT/2000,
and supports all basic FTP commands, and much more, such as passive mode.

http://www.mollensoft.com

- --[ Summary

A vulnerability exists in Hyperion Ftp Server which allows a remote user to
traverse the directories of a target host. This may lead to the disclosure of
file and directory contents. Arbitrary directories can be accessed through the
use of double dot '../' techniques when using the 'ls' command.

- --[ Tested

Hyperion Ftp Server v2.8.1 / Windows 2000 sp3
Hyperion Ftp Server v2.8.1 / Windows 98 SE

- --[ Vulnerable

Hyperion Ftp Server v2.8.1 / Windows 2000 sp3
Hyperion Ftp Server v2.8.1 / Windows 98 SE

- --[ Disclaimer

http://www.securityoffice.net is not responsible for the misuse or illegal
use of any of the information and/or the software listed on this security advisory.

- --[ Author

Tamer Sahin
ts@securityoffice.net
http://www.securityoffice.net

All our advisories can be viewed at http://www.securityoffice.net/articles/

Please send suggestions, updates, and comments to feedback@securityoffice.net

(c) 2002 SecurityOffice

This Security Advisory may be reproduced and distributed, provided that this Security
Advisory is not modified in any way and is attributed to SecurityOffice and provided
that such reproduction and distribution is performed for non-commercial purposes.

Tamer Sahin
http://www.securityoffice.net

-----BEGIN PGP SIGNATURE-----
Version: 2.6

iQEVAwUAPdElEPpL5ibJRTtBAQEyXwf7BywUZz1Ls8HWrNkos35NaErorXA6Geiy
+Ii9NakLjG+ITR86h8FcEnNmjtUpjdGFPqLbDJq7UdpAA/llIBGB5HmURariY8Mf
7aoREOANHy0ShUzwxBvR6OgsaxQ2mpinY15mgyWKwAoq6oUdiOttTTCNYLeZ9sup
Hmf+QWfqWwtUsVxSAqtHGrp7+9QH0aPO8VVsKzE1UrjwMxCBpgv+99u78ESgkWaM
CqwmmTzjPk0x1rzZrDafrQZO34Ts3+72cuM3wV2MDfdQNOO9RC6Hv7MimLZXn+M3
QI0ToqYmHQfctBOG6Bk5cshG5yz7JqFjz8bCI6f1vdoI3PRHR3Kiig==
=pmk3
-----END PGP SIGNATURE-----



Login or Register to add favorites

File Archive:

October 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    39 Files
  • 2
    Oct 2nd
    23 Files
  • 3
    Oct 3rd
    18 Files
  • 4
    Oct 4th
    20 Files
  • 5
    Oct 5th
    0 Files
  • 6
    Oct 6th
    0 Files
  • 7
    Oct 7th
    17 Files
  • 8
    Oct 8th
    66 Files
  • 9
    Oct 9th
    25 Files
  • 10
    Oct 10th
    20 Files
  • 11
    Oct 11th
    21 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    14 Files
  • 15
    Oct 15th
    49 Files
  • 16
    Oct 16th
    28 Files
  • 17
    Oct 17th
    23 Files
  • 18
    Oct 18th
    10 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    5 Files
  • 22
    Oct 22nd
    12 Files
  • 23
    Oct 23rd
    23 Files
  • 24
    Oct 24th
    9 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close