[15763] in bugtraq

home help back first fref pref prev next nref lref last post

Re: ftpd: the advisory version

daemon@ATHENA.MIT.EDU (Richard Rager)
Wed Jul 12 17:16:45 2000

Mime-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Message-Id:  <Pine.LNX.4.10.10007111137420.22359-100000@penguin.penguinmaster.com>
Date:         Tue, 11 Jul 2000 11:47:49 -0600
Reply-To: Richard Rager <kb8rln@PENGUINMASTER.COM>
From: Richard Rager <kb8rln@PENGUINMASTER.COM>
X-To:         "D. J. Bernstein" <djb@CR.YP.TO>
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  <20000710201100.10973.qmail@cr.yp.to>

On Mon, 10 Jul 2000, D. J. Bernstein wrote:

> 1. Surely there are other people still wondering about proftpd. Can an
> attacker take over proftpd 1.2.0pre10? CERT seems to say yes, but the
> maintainer says ``relatively minor.'' What's the deal?
>
   Yes I have had someone get a shell account on my box with proftpd
1.2.0pre10.  I was able to keep him out for a little more with time with
kernel 2.2.16 until the code changed.  This is in the wild!

> 2. I agree that setproctitle() is rather pointless. My comments were
> about all functions with printf()-type format strings. Typical strings
> should fail as format strings.
>
  Yes


  I was running proftpd in stand alone mode.  The proftpd dies in some of
 these attacts.  It was running as user ftp.


Enjoy,

Richard

home help back first fref pref prev next nref lref last post