[10493] in bugtraq

home help back first fref pref prev next nref lref last post

Re: wu-ftpd exploit fix

daemon@ATHENA.MIT.EDU (Jordan Ritter)
Sat May 8 18:08:41 1999

Mime-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Message-Id: <Pine.LNX.4.05.9905071433280.9190-100000@demerol.darkridge.com>
Date: 	Fri, 7 May 1999 14:44:10 -0400
Reply-To: Jordan Ritter <jpr5@DARKRIDGE.COM>
From: Jordan Ritter <jpr5@DARKRIDGE.COM>
X-To:         Adam Maloney <adam@IEXPOSURE.COM>
To: BUGTRAQ@NETSPACE.ORG
In-Reply-To:  <3731EB54.4E800114@iexposure.com>

On Thu, 6 May 1999, Adam Maloney wrote:

> We evaluated the source to the exploit, and made some changes to
> realpath.c (found in the /src directory of the wu-ftpd tarball)

hate to tell you this, but these things have already been fixed, and by
several in parallel.  latest vr series ftpd, with redhat's changes merged
in:

ftp://ftp.vr.net/pub/wu-ftpd/wu-ftpd-2.4.2-vr17.tar.gz


> Interestingly enough, from the code that we saw, there was already
> code in the source to handle buffer overflows, but it wasn't
> implemented for all of the functions.

not to mention path-filter


Jordan Ritter
Network Security Engineer
Netect/Bindview Corp  Boston, MA

"Quis custodiet ipsos custodes?"

home help back first fref pref prev next nref lref last post