Re: CERT Advisory CA-99.13 - Multiple Vulnerabilities in WU-FTPD

From: Rami Dass (r-dassat_private)
Date: Thu Oct 21 1999 - 13:05:22 PDT

  • Next message: Marc SCHAEFER: "Local user can send forged packets"

    Also, I beleive that this problem occurs only in certain OS's vulnerable to
    the getcwd() exploit, the ERRATA file, in the 2.6.0 source tree, lists them:
    
    "Systems needing getcwd():
    
      BSD 4.4       (bsd)
      Unix 3.x      (dec)
      DG/UX         (dgx)
      Dynix         (dyn)
      generic       (gen)
      NeXTstep 2.x  (nx2)
      OSF/1         (osf)
      Sony NewsOS   (sny)"
    
    So this exploit MIGHT be OS specific and certain OS's running versions prior
    to 2.6.0 may not be affected.  I did try building 2.6.0 under Solaris 7, and
    there were some problems with using "ls".
    
    Incidentally, there has been a patch available to address the getcwd() issue
    on the ftp site for wu-ftpd that can be applied to 2.5.0.
    
    -----Original Message-----
    From: Richard Trott [mailto:trottat_private]
    Sent: Wednesday, October 20, 1999 5:17 PM
    To: BUGTRAQat_private
    Subject: Re: CERT Advisory CA-99.13 - Multiple Vulnerabilities in
    WU-FTPD
    
    
    > WU-FTPD and BeroFTPD
    >
    >    Vulnerability #1:
    >
    >    Not vulnerable:
    >           versions 2.4.2 and all betas and earlier versions
    >           Vulnerable:
    >           wu-ftpd-2.4.2-beta-18-vr4 through wu-ftpd-2.4.2-beta-18-vr15
    >           wu-ftpd-2.4.2-vr16 and wu-ftpd-2.4.2-vr17
    >           wu-ftpd-2.5.0
    >           BeroFTPD, all versions
    
    CERT appears to have left out wu-ftpd-2.6.0 (although they included it in
    the lists for the other two vulnerabilities).
    
    Version 2.6.0 does *not* have the "MAPPING_CHDIR Buffer Overflow"
    vulnerability, at least if the ANNOUNCE-RELEASE file for that version is
    to be believed.  It reads, in part:
    
    "Corrected an error in the MAPPING_CHDIR feature which could be used to
    gain root privileges on the server."
    
    Presumably, this refers to this vulnerability.
    
    Rich
    



    This archive was generated by hypermail 2b30 : Fri Apr 13 2001 - 15:08:31 PDT