4603614 1999-12-20 19:12 /39 rader/ Postmaster
Mottagare: Bugtraq (import) <8964>
Ärende: Security vulnerability in certain wu-ftpd (and derivitives
------------------------------------------------------------
configurations (fwd)
Approved-By: aleph1@SECURITYFOCUS.COM
Delivered-To: bugtraq@lists.securityfocus.com
Delivered-To: bugtraq@securityfocus.com
X-Sender: suid@jawa.chilli.net.au
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Message-ID: <Pine.LNX.4.20.9912201251090.16053-100000@jawa.chilli.net.au>
Date: Mon, 20 Dec 1999 12:53:13 +1100
Reply-To: suid <suid@SUID.EDU>
Sender: Bugtraq List <BUGTRAQ@SECURITYFOCUS.COM>
From: suid <suid@SUID.EDU>
X-To: bugtraq@securityfocus.com
To: BUGTRAQ@SECURITYFOCUS.COM
The following paper is available in full from my website, i have
chosen not to post the entire thing here as it is quite long.
http://www.suid.edu/advisories/001.txt
suid@suid.edu - the dangers of ftp conversions on misconfigured
systems/ftpd (specifically wu-ftpd)
Summary:
There exists a vulnerability with certain configurations of
certain ftp daemons with which users with a valid ftp only
acccount on a system may execute arbitrary commands
(including binaries supplied by themselves). There also
exists the possibilty that anonymous ftp users may execute
arbitrary commands (also including binaries supplied by
themselves).
While this vulnerability is entirely configuration
dependent. The required configuration is rather common. The
requirements can be found in the example exploit
section. Usually such misconfigurations are made only by the
security-handicapped, and the documentation-illiterate. There
is volumous amounts of documentation around which warn
against this kind of configuration however it does not touch
on this exact problem. Nor does that seem to prevent people
from doing this time after time.
Regards,
suid@suid.edu
(4603614) ------------------------------------------(Ombruten)