[14319] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Update: Extending the FTP "ALG" vulnerability to any FTP

daemon@ATHENA.MIT.EDU (Darren Reed)
Fri Mar 17 00:39:12 2000

Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id:  <200003150427.PAA10825@cairo.anu.edu.au>
Date:         Wed, 15 Mar 2000 15:27:36 +1100
Reply-To: Darren Reed <avalon@COOMBS.ANU.EDU.AU>
From: Darren Reed <avalon@COOMBS.ANU.EDU.AU>
X-To:         mikael.olsson@ENTERNET.SE
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  <38CE2D65.5CCE95FD@enternet.se> from "Mikael Olsson" at Mar 14,
              2000 01:15:33 PM

In some mail from Mikael Olsson, sie said:
>
>   * RealAudio/Video (secondary UDP channel)

This can't be exploited in even close to the same way, if the proxy is
properly implemented.  You might be able to write a java class to exploit
this from a web server which was waiting more easily than playing funny
games with URL's in HTML pages...if the web server is evil, having java
enabled is a big risk.

>  Workarounds to this specific vulnerability
> --------------------------------------------
>
>   * Disable active FTP. Errrr, wait. The fix for the server side
>     vulnerability was to disable passive FTP. Let's rephrase that:

Which specific vulnerability was this ?
And was it a vulnerability or a DoS problem ?

oh, FWIW, some people do run ftp servers on non-port 20/21 with the
ftp-data port still one less than the real ftp port.

Darren

home help back first fref pref prev next nref lref last post