[3463] in bugtraq

home help back first fref pref prev next nref lref last post

Re: bin/1805: Bug in ftpd

daemon@ATHENA.MIT.EDU (Marc Slemko)
Tue Oct 15 10:29:22 1996

Date: 	Mon, 14 Oct 1996 15:04:51 -0500
Reply-To: Marc Slemko <marcs@znep.com>
From: Marc Slemko <marcs@znep.com>
To: Multiple recipients of list BUGTRAQ <BUGTRAQ@netspace.org>
In-Reply-To:  <199610141152.EAA23237@freefall.freebsd.org>

On Mon, 14 Oct 1996 rkozak@bdk.lublin.pl wrote:

>
> >Number:         1805
> >Category:       bin
> >Synopsis:       Bug in ftpd
> >Confidential:   no
> >Severity:       serious
> >Priority:       medium
> >Responsible:    freebsd-bugs
> >State:          open
> >Class:          change-request
> >Submitter-Id:   current-users
> >Arrival-Date:   Mon Oct 14 05:00:01 PDT 1996
> >Last-Modified:
> >Originator:     Robert Kozak
> >Organization:
> BDK w Lublinie S.A.
> >Release:        FreeBSD 2.1.5-RELEASE
> >Environment:
> FreeBSD celebris1.bdk.lublin.pl 2.1.5-RELEASE FreeBSD 2.1.5-RELEASE #0: Thu Sep
>   5 13:21:39 MET DST 1996     root@celebris1.bdk.lublin.pl:/usr/src/sys/compile/
> RKKERNEL  i386
> >Description:
> While user is connected to server via ftp, the process ftpd is owned
> by this user. When ftpd is abnormally termineted (e.g. kill -11 <ftpd-id>)
> the memory image of this process is writed to file ftpd.core in home dir.
> This file contain encrypted passwords all users on this machine.
>
>
> >How-To-Repeat:
> 1. ftp localhost
>   name: username
>   password: ****
> 2. On second terminal:
>   a) ps -ax | grep localhost
>   b) kill -11 <PID>
>   c) strings ~/ftpd.core | less (you will see all encrypted passwords).
>
> >Fix:
>
> >Audit-Trail:
> >Unformatted:
>

That isn't nice.  I don't think it will contain the passwords of all the
users, just a certain subset of them.  This also a problem with older
versions of wuftpd, but the latest beta seems to be fine, although I'm not
sure if that is just a fluke or by design. There are several possible
fixes, but for those that need a temporary fix ASAP, a workaround follows.
There should be no security problems with this, but there could be
something I'm missing.

Create a script.  I'll assume it is /usr/local/libexec/ftpd.wrapper.  In
it, put the following:

-------
#!/bin/sh
ulimit -c 0
exec /usr/libexec/ftpd $*
-------

where /usr/libexec/ftpd is the path to your old ftp daemon.  Modify
/etc/inetd.conf and replace /usr/libexec/ftpd with
/usr/local/libexec/ftpd.wrapper.

What this does is prevent the process from core dumping, therefore
eliminating the problem.

A more permanent fix to the source may be something along the lines of the
below patch (against RELENG_2_1_5_RELEASE), but there should be an
official fix out in the next little bit:

*** /usr/src/libexec/ftpd/ftpd.c        Mon Mar 18 04:10:16 1996
--- ftpd.c      Mon Oct 14 12:07:21 1996
***************
*** 47,55 ****
--- 47,58 ----
   * FTP server.
   */
  #include <sys/param.h>
+ #include <sys/time.h>
+ #include <sys/resource.h>
  #include <sys/stat.h>
  #include <sys/ioctl.h>
  #include <sys/socket.h>
+ #include <sys/types.h>
  #include <sys/wait.h>
  #include <sys/mman.h>

***************
*** 219,227 ****
--- 222,232 ----
        int addrlen, ch, on = 1, tos;
        char *cp, line[LINE_MAX];
        FILE *fd;
+         struct rlimit rlim;

        tzset();                /* in case no timezone database in ~ftp */

+
        /*
         * LOG_NDELAY sets up the logging connection immediately,
         * necessary for anonymous ftp's that chroot and can't do it later.
***************
*** 232,237 ****
--- 237,253 ----
                syslog(LOG_ERR, "getpeername (%s): %m",argv[0]);
                exit(1);
        }
+
+       /*
+        * prevent ftpd from dumping core; necessary to prevent a user
+        * from getting a core file with privileged information in
+        */
+         rlim.rlim_cur = rlim.rlim_max = 0;
+         if (setrlimit(RLIMIT_CORE, &rlim) != 0) {
+               syslog(LOG_ERR, "setrlimit(RLIMIT_CORE, &rlim) failed");
+               exit(1);
+       }
+
  #ifdef SKEY
        strcpy(addr_string, inet_ntoa(his_addr.sin_addr));
  #endif

home help back first fref pref prev next nref lref last post