[34616] in bugtraq

home help back first fref pref prev next nref lref last post

Re: NcFTP - password leaking

daemon@ATHENA.MIT.EDU (Frank v Waveren)
Tue Apr 20 21:02:17 2004

Date: Tue, 20 Apr 2004 19:02:15 +0200
From: Frank v Waveren <fvw@var.cx>
To: Konstantin Gavrilenko <mlists@arhont.com>
Cc: bugtraq@securityfocus.com
Message-ID: <20040420170215.GA15050@var.cx>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <408464C2.8070609@arhont.com>

On Tue, Apr 20, 2004 at 12:46:10AM +0100, Konstantin Gavrilenko wrote:
> ncftp client does not hash the password under certain conditions. And 
> such information is made available to other users through `ps aux`
[snip]
> root       798  0.0  0.1  2020 1064 pts/3    S    15:04   0:00 ncftp
> ftp://testuser:testpassword@filo.dmz.arhont.com/

I assume by hashing you mean scribbling over the password value in
ARGV? That still leaves a race condition where the password is visible
between the execve and the overwriting; There is no secure way of
passing secrets on the commandline on a multiuser unix system. Use a
file descriptor or a file (either of which can ofcourse be referenced
on the command line).

-- 
Frank v Waveren                                      Fingerprint: 9106 FD0D
fvw@[var.cx|stack.nl] ICQ#10074100                      D6D9 3E7D FAF0 92D1
Public key: hkp://wwwkeys.pgp.net/8D54EB90              3931 90D6 8D54 EB90

home help back first fref pref prev next nref lref last post