You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Hi, I found the memory of ftp-srv can be easily filled up with a lot of "h\r\n"-like sequences. It shows that sending a long sequence with a lot of sequences like "h\r\n" to the server can easily make the server's JavaScript heap space out of memory and make the server aborted (core dumped). It seems there is an issue in memory control and command process. This may be a threat and exploited by attackers to do the Dos attack.
Description
Hi, I found the memory of ftp-srv can be easily filled up with a lot of "h\r\n"-like sequences. It shows that sending a long sequence with a lot of sequences like "h\r\n" to the server can easily make the server's JavaScript heap space out of memory and make the server aborted (core dumped). It seems there is an issue in memory control and command process. This may be a threat and exploited by attackers to do the Dos attack.
A similar threat can refer to CVE-2017-7651
Note that even unauthorized accesses can do this.
Environment
docker Ubuntu 20.04.3 LTS
ftp-srv (github commit 18277e9 on Jun 28)
node version v14.20.0
Attack simulation
run server
run attack script
the attack script (in python) may seem like
Result
the server aborted (core dumped) and output information
The text was updated successfully, but these errors were encountered: