[35955] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: FTP exploit?

daemon@ATHENA.MIT.EDU (ken harris.)
Mon Mar 19 19:20:21 2001

Message-Id: <5.0.2.1.0.20010319191119.00ab24a8@babyblue.boii.com>
Date: Mon, 19 Mar 2001 19:17:32 -0500
To: Scott Francis <scott@virtualis.com>
From: "ken harris." <ken@boii.com>
Cc: nanog@merit.edu, Clayton Fiske <clay@bloomcounty.org>
In-Reply-To: <20010319132059.E3496@virtualis.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"; format=flowed
Errors-To: owner-nanog-outgoing@merit.edu



>probably due to the increasingly long thread on vulnerabilities in ftpds that
>is going on over in BUGTRAQ. Nothing too new, but every time a new 'sploit' is
>released there, every kiddie on the block just has to try it.

to be a bit more specific.

the exploit/bug comes from a problem with globbing.
(ie: ls */../*/../*/../*/../*/../*/../*/../*/../*/../*/../*/../*/../*)

affected ftp daemons are the majority of them (proftpd etc)
except ncftpd and glftpd from what i've seen.

it was another one of those 'i'm so elite i'm going to
notify the vendors 30 minutes before posting to bugtraq'
so right now vendors are working on latest versions.

cheers,
-ken harris.



home help back first fref pref prev next nref lref last post