[13021] in bugtraq

home help back first fref pref prev next nref lref last post

Security vulnerability in certain wu-ftpd (and derivitives)

daemon@ATHENA.MIT.EDU (suid)
Mon Dec 20 13:17:35 1999

Mime-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Message-Id:  <Pine.LNX.4.20.9912201251090.16053-100000@jawa.chilli.net.au>
Date:         Mon, 20 Dec 1999 12:53:13 +1100
Reply-To: suid <suid@SUID.EDU>
From: suid <suid@SUID.EDU>
X-To:         bugtraq@securityfocus.com
To: BUGTRAQ@SECURITYFOCUS.COM

The following paper is available in full from my website, i have chosen
not to post the entire thing here as it is quite long.

http://www.suid.edu/advisories/001.txt

suid@suid.edu - the dangers of ftp conversions on misconfigured systems/ftpd (specifically wu-ftpd)

Summary:

	There exists a vulnerability with certain configurations of certain ftp daemons with which users with a valid
	ftp only acccount on a system may execute arbitrary commands (including binaries supplied by themselves). There
	also exists the possibilty that anonymous ftp users may execute arbitrary commands (also including binaries
	supplied by themselves).

	While this vulnerability is entirely configuration dependent. The required configuration is rather common. The
	requirements can be found in the example exploit section. Usually such misconfigurations are made only by the
	security-handicapped, and the documentation-illiterate. There is volumous amounts of documentation around which
	warn against this kind of configuration however it does not touch
	on this exact problem. Nor does that seem to prevent people from doing
	this time after time.


Regards,
suid@suid.edu

home help back first fref pref prev next nref lref last post