[9976] in bugtraq

home help back first fref pref prev next nref lref last post

comment about ftp exploit

daemon@ATHENA.MIT.EDU (Alex Yu)
Thu Mar 25 23:53:35 1999

Date: 	Tue, 23 Mar 1999 13:52:04 -0500
Reply-To: Alex Yu <ayu1@NYCAP.RR.COM>
From: Alex Yu <ayu1@NYCAP.RR.COM>
To: BUGTRAQ@NETSPACE.ORG

> -----Original Message-----
> From: owner-wu-ftpd@wugate.wustl.edu [mailto:owner-wu-ftpd@wugate.wustl.
> edu] On Behalf Of Gregory A Lundberg
> Sent: Tuesday, March 23, 1999 10:44 AM
> To: Russ Allbery
> Cc: ayu1@nycap.rr.com; wu-ftpd@wugate.wustl.edu
> Subject: Re: FW: ftp exploit
>
>
> On 23 Mar 1999, Russ Allbery wrote:
>
> > > any comments?
> >
> > It's an exploit script for the path overflow bug that's already been
> > announced by CERT, been on all the security lists, and has already
> > been fixed in the latest version of every wu-ftpd variant that I'm
> > aware of as well as being the impetus for the final mainline wu-ftpd
> > release?
>
> Correct.  This is a full exploit against Redhat 5.2 (the original advisory
> was based upon a test, not an exploit).
>
> My comment: This posting proves why you need to keep up with the CERT
> mailing list, if not Bugtraq and other lists.  As often heppens, the
> exploit followed the discovery of the vulnerability by several weeks.
> While it sometimes happens that exploits are distributed before the daemon
> authors are notified and public security announcement made, this was not
> the case here.
>
>
>
> My testing shows:
>
> This is an exploit using the buffer overflow described in
>
>   CERT Advisory CA-99.03 - FTP-Buffer-Overflows
>
> Available from htp://www.CERT.org/
>
> It is directed solely at Redhat CD 4.2 Linux systems running a clean,
> default install.  It was not successfull on unclean 5.2 systems, the
> pre-5.2 systems I tested on, or when I built the daemon by-hand instead of
> using  a Redhat (S)RPM.  My testing showed, while none of the systems I
> have available were exploitable, the exploit WOULD HAVE WORKED but failed
> for identifiable reasons.
>
> Given working code for Redhat 4.2, it should be a fairly simply matter to
> port to non-Linux or non-5.2 systems.
>
>
>
> WHO IS VULNERABLE
> -----------------
>
>  - Systems running ALL versions of WU-FTPD _prior_ to 2.4.2 (final),
>    including all 2.4.2-beta versions, ARE VULNERABLE, except as noted
>    below:
>
>  - Systems with proper upload clauses are partially protected.  Many
>    systems do not use proper upload clauses for real/guest users and are
>    NOT protected from abuse by their local users.
>
>  - Systems with proper permissions are partially protected.  Most systems
>    do not use proper permissions for real/guest users since they would
>    prevent use by Telnet/SSH/Shell .. such systems are NOT protected from
>    their local users.
>
>
>
> WHO IS NOT VULNERABLE
> ---------------------
>
>  - Systems running 2.4.2 (final) are protected against _this_ bug.  Such
>    systems should upgrade to VR16 for maximum security; a number of other
>    bugs and security problems have been fixed in VR16.
>
>  - Systems running 2.4.2-beta-18-VR10 or later are protected.  Anyone
>    running VR10 through VR13 should upgrade to VR14 or later at your
>    earliest convenience.
>
>  - Systems running BeroFTPD 1.2.0 or later are NOT vulnerable.  All
>    BeroFTPD systems should upgrade to the current version (1.3.4) at their
>    earliest conenience.  Anyone running a vulnerable system with NEWVIRT,
>    will want to immedeately upgrade to BeroFTPD.
>
>
>
> The location of the latest version of wu-ftpd can be found in the
> directory
>
>      ftp://ftp.vr.net/pub/wu-ftpd/
>
>wu-ftpd Resource Center:  http://www.landfield.com/wu-ftpd/
>wu-ftpd FAQ:              http://www.cetis.hvu.nl/~koos/wu-ftpd-faq.html
>wu-ftpd list archive:     http://www.landfield.com/wu-ftpd/mail-archive/
>
>--
>
>Gregory A Lundberg              Senior Partner, VRnet Company
>1441 Elmdale Drive              lundberg+wuftpd@vr.net
>Kettering, OH 45409-1615 USA    1-800-809-2195

home help back first fref pref prev next nref lref last post