Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Application (File Transfer/Sharing)  >   FTP (Generic) Vendors:   Caldera/SCO
(Caldera Issues Fix for UnixWare) Re: Several FTP Server Implementations Allow Remote Users to Obtain Root-Level Privileges on the Server
SecurityTracker Alert ID:  1002554
SecurityTracker URL:
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Oct 16 2001
Impact:   Execution of arbitrary code via local system, Execution of arbitrary code via network, Root access via local system, Root access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   Network Associates COVERT Labs issued an advisory (COVERT-2001-02) for multiple FTP server implementations. These implementations allow remote and local users to obtain root-level privileges on the server.

In general, if the remote user has the ability to create directories on the FTP server, these vulnerabilities can be exploited. The vulnerabilities are related to the use of the glob() function.

In some cases, user input that has been expanded by glob() can exceed expected boundary lengths and trigger a buffer overflow. In other cases, the glob() function contains other buffer overflows.

Network Associates reports that the following operating systems have been confirmed to contain vulnerable FTP daemons:

FreeBSD 4.2, OpenBSD 2.8, NetBSD 1.5, IRIX 6.5.x, HPUX 11, Solaris 8

For details on the exact nature of the vulnerabilities, see the source message or refer to the COVERT Labs Advisory:

Impact:   A remote or local user can obtain root privileges on the FTP server.
Solution:   Caldera has issued a fix for /usr/sbin/in.ftpd on UnixWare 7. Fixed binaries are available at:

The md5 verification checksum is:

080551194083e645312089995feb330b erg711697a.Z

Caldera notes that the affected binaries can be upgraded with the following commands:

# uncompress /tmp/erg711697a.Z
# pkgadd -d /tmp/erg711697a

Cause:   Boundary error
Underlying OS:  UNIX (Open UNIX-SCO)

Message History:   This archive entry is a follow-up to the message listed below.
Apr 10 2001 Several FTP Server Implementations Allow Remote Users to Obtain Root-Level Privileges on the Server

 Source Message Contents

Subject:  Security Update: [CSSA-2001-SCO.27] UnixWare 7: ftpd glob security vulnerability

Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: 8bit            


Do not reply to this mail. This security advisory is being sent from a
nonexistent address in order to avoid spam problems.  Caldera's
contact address for UNIX security issues is


	    Caldera International, Inc. Security Advisory

Subject:		UnixWare 7: ftpd glob security vulnerability
Advisory number: 	CSSA-2001-SCO.27
Issue date: 		2001 October 15
Cross reference:

1. Problem Description
	The ftpd program is vulnerable to the security vulnerability
	described in CERT advisory CA-2001-07.

2. Vulnerable Versions

	Operating System	Version		Affected Files
	UnixWare 7		All		/usr/sbin/in.ftpd

3. Workaround


4. UnixWare 7

  4.1 Location of Fixed Binaries

  4.2 Verification

	md5 checksums:
	080551194083e645312089995feb330b	erg711697a.Z

	md5 is available for download from

  4.3 Installing Fixed Binaries

	Upgrade the affected binaries with the following commands:

	# uncompress /tmp/erg711697a.Z
	# pkgadd -d /tmp/erg711697a

5. References

	This and other advisories are located at

	This advisory addresses Caldera Security internal incidents
	sr846643, fz517224, and erg711697.

6. Disclaimer

	Caldera International, Inc. is not responsible for the misuse
	of any of the information we provide on our website and/or
	through our security advisories. Our advisories are a service
	to our customers intended to promote secure installation and
	use of Caldera International products.

7. Acknowledgements

	Caldera International wishes to thank COVERT Labs at PGP
	Security for discovering and reporting this problem.


Content-Type: application/pgp-signature
Content-Disposition: inline

Version: GnuPG v1.0.6 (SCO_SV)
Comment: For info see




Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, LLC