[12897] in bugtraq

home help back first fref pref prev next nref lref last post

FTP DoS - PORT and PASV effected.

daemon@ATHENA.MIT.EDU (Darren Reed)
Thu Dec 9 00:33:44 1999

Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id:  <199912072119.IAA13755@cairo.anu.edu.au>
Date:         Wed, 8 Dec 1999 08:19:41 +1100
Reply-To: Darren Reed <avalon@COOMBS.ANU.EDU.AU>
From: Darren Reed <avalon@COOMBS.ANU.EDU.AU>
X-To:         Renaud Deraison <deraison@cvs.nessus.org>
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  <Pine.LNX.4.10.9912071840380.3431-100000@prof.fr.nessus.org> from
              "Renaud Deraison" at Dec 07, 1999 06:46:05 PM

In some mail from Renaud Deraison, sie said:
>
> On Tue, 7 Dec 1999, Darren Reed wrote:
>
> > Who has more free file descriptors & network ports, you or the ftp server ?
>
>
> The attack you are describing is not new - this is just a PASV attack,
> which has been around for years.
>
> Hopefully, this problem is now solved.
[...]

btw, a similar sort of attack can be mounted using the PORT command.
You just need to setup a local listener, etc, or get the ftp server
to try connect to lots of network 10 sites in < 75 seconds before
TCP connect's start timing out.  I'll leave that as an exercise for
the reader - a correct fix for the PASV problem should fix this one
as well (and the exploit is almost the same too).

Darren

home help back first fref pref prev next nref lref last post