[10226] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Possible WU-ftpd Worm ?

daemon@ATHENA.MIT.EDU (M.Brands)
Thu Apr 15 13:24:29 1999

Date: 	Thu, 15 Apr 1999 00:36:53 +0200
Reply-To: "M.Brands" <shrike@IL.FONTYS.NL>
From: "M.Brands" <shrike@IL.FONTYS.NL>
X-To:         Stu Alchor <stu@UPD.CEFETSP.BR>
To: BUGTRAQ@NETSPACE.ORG
In-Reply-To:  <Pine.LNX.3.96.990414021634.928A-100000@upd.cefetsp.br>; from Stu
              Alchor on Wed, Apr 14, 1999 at 02:19:17AM -0300

>  * Limitations:
>  *
>  *    because I've used hard coded address's for system and the command,
>  *    the  values  wont  be  the same in others compilations of wu-ftpd.
>  *    so,  you will  need to  find   the  address   for   the   version
>  *    you want to exploit.
>  *
>  *    because we are not using the stack to  put our code, the  exploit
>  *    will work  as well against a non-executable stack patch.
>  *
>  *
>  * RECOMENDATION = Please, run gdb through the wu.ftpd binary in order to
>  * find out your "system address" (ie: print system) and  write it   down
>  * so you can have more address to try - just overwrite the default addr
>  * and choose type (3).

> /* CUSTOM ADDRESS, CHANGE IT IN ORDER TO EXPLOIT ANOTHER BOX */
> #define SYSADDR 0x40043194;
> #define EGGADDR 0x805f1dc;

I just checked my Redhat 5.2 system with wu-ftpd-2.4.2b18-2.1.rpm installed.
Since the stock binary was stripped, I built a new one with the source RPM.
Checking both the symbols and the source, I could not find any use of the
system(3) call. That's pretty hard to exploit...

I think at least the version of wu-ftpd supplied by Redhat isn't exploitable.
I could however be terribly wrong. In that case I guess I'll have to find a
very big rock to hide under :)

Mathijs

home help back first fref pref prev next nref lref last post