[1995] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Exploit for Linux wu.ftpd hole

daemon@ATHENA.MIT.EDU (Marek Michalkiewicz)
Thu Jul 6 21:49:13 1995

Date:         Thu, 6 Jul 1995 13:59:39 +0200
Reply-To: Bugtraq List <BUGTRAQ@CRIMELAB.COM>
From: Marek Michalkiewicz <marekm@i17linuxb.ists.pwr.wroc.pl>
X-To:         BUGTRAQ%CRIMELAB.COM@plearn.edu.pl
To: Multiple recipients of list BUGTRAQ <BUGTRAQ@CRIMELAB.COM>
In-Reply-To:  <Pine.LNX.3.91.950705184600.3247A-100000@rapture.cyberflunk.com>
              from "bt" at Jul 5, 95 06:46:58 pm

bt:
> You have to run as root to setuid to the user, to open the log files,
> and to chroot (for anon) to the ftp dir.. of course after login, root
> privs are not really needed.

They are needed to create ftp-data sockets (privileged port number).
That's why ftpd runs (most of the time) with the effective uid of the
user who is logged in, but real uid 0 (so that it can get root privs
for a while, to create a socket).  But no external program (like ls,
gzip, tar, ...) needs to run as root - there should be something like
setgid(getegid()); setuid(geteuid()); between fork and exec in ftpd_popen.
This would prevent the slackware hole from giving root access.

Comments?

Marek Michalkiewicz

home help back first fref pref prev next nref lref last post