SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (File Transfer/Sharing)  >   FTP (Generic) Vendors:   Caldera/SCO
(Caldera Issues Fix for UnixWare) Re: Several FTP Server Implementations Allow Remote Users to Obtain Root-Level Privileges on the Server
SecurityTracker Alert ID:  1002554
SecurityTracker URL:  http://securitytracker.com/id/1002554
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Oct 16 2001
Impact:   Execution of arbitrary code via local system, Execution of arbitrary code via network, Root access via local system, Root access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   Network Associates COVERT Labs issued an advisory (COVERT-2001-02) for multiple FTP server implementations. These implementations allow remote and local users to obtain root-level privileges on the server.

In general, if the remote user has the ability to create directories on the FTP server, these vulnerabilities can be exploited. The vulnerabilities are related to the use of the glob() function.

In some cases, user input that has been expanded by glob() can exceed expected boundary lengths and trigger a buffer overflow. In other cases, the glob() function contains other buffer overflows.

Network Associates reports that the following operating systems have been confirmed to contain vulnerable FTP daemons:

FreeBSD 4.2, OpenBSD 2.8, NetBSD 1.5, IRIX 6.5.x, HPUX 11, Solaris 8

For details on the exact nature of the vulnerabilities, see the source message or refer to the COVERT Labs Advisory:

http://www.pgp.com/research/covert/advisories/048.asp

Impact:   A remote or local user can obtain root privileges on the FTP server.
Solution:   Caldera has issued a fix for /usr/sbin/in.ftpd on UnixWare 7. Fixed binaries are available at:

ftp://stage.caldera.com/pub/security/unixware/CSSA-2001-SCO.27/

The md5 verification checksum is:

080551194083e645312089995feb330b erg711697a.Z

Caldera notes that the affected binaries can be upgraded with the following commands:

# uncompress /tmp/erg711697a.Z
# pkgadd -d /tmp/erg711697a

Cause:   Boundary error
Underlying OS:  UNIX (Open UNIX-SCO)

Message History:   This archive entry is a follow-up to the message listed below.
Apr 10 2001 Several FTP Server Implementations Allow Remote Users to Obtain Root-Level Privileges on the Server



 Source Message Contents

Subject:  Security Update: [CSSA-2001-SCO.27] UnixWare 7: ftpd glob security vulnerability


--MGYHOYXEY6WxJCY8
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: 8bit            

To: bugtraq@securityfocus.com security-announce@lists.securityportal.com announce@lists.caldera.com scoannmod@xenitec.on.ca



Do not reply to this mail. This security advisory is being sent from a
nonexistent address in order to avoid spam problems.  Caldera's
contact address for UNIX security issues is security-alert@caldera.com.


___________________________________________________________________________

	    Caldera International, Inc. Security Advisory

Subject:		UnixWare 7: ftpd glob security vulnerability
Advisory number: 	CSSA-2001-SCO.27
Issue date: 		2001 October 15
Cross reference:
___________________________________________________________________________


1. Problem Description
	
	The ftpd program is vulnerable to the security vulnerability
	described in CERT advisory CA-2001-07.


2. Vulnerable Versions

	Operating System	Version		Affected Files
	------------------------------------------------------------------
	UnixWare 7		All		/usr/sbin/in.ftpd


3. Workaround

	None.


4. UnixWare 7

  4.1 Location of Fixed Binaries

	ftp://stage.caldera.com/pub/security/unixware/CSSA-2001-SCO.27/


  4.2 Verification

	md5 checksums:
	
	080551194083e645312089995feb330b	erg711697a.Z


	md5 is available for download from

		ftp://stage.caldera.com/pub/security/tools/


  4.3 Installing Fixed Binaries

	Upgrade the affected binaries with the following commands:

	# uncompress /tmp/erg711697a.Z
	# pkgadd -d /tmp/erg711697a


5. References

	http://www.cert.org/advisories/CA-2001-07.html
	http://www.kb.cert.org/vuls/id/808552

	This and other advisories are located at
		http://stage.caldera.com/support/security

	This advisory addresses Caldera Security internal incidents
	sr846643, fz517224, and erg711697.

6. Disclaimer

	Caldera International, Inc. is not responsible for the misuse
	of any of the information we provide on our website and/or
	through our security advisories. Our advisories are a service
	to our customers intended to promote secure installation and
	use of Caldera International products.


7. Acknowledgements

	Caldera International wishes to thank COVERT Labs at PGP
	Security for discovering and reporting this problem.

	 
___________________________________________________________________________

--MGYHOYXEY6WxJCY8
Content-Type: application/pgp-signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (SCO_SV)
Comment: For info see http://www.gnupg.org

iEYEARECAAYFAjvLWS4ACgkQaqoBO7ipriH9aQCfXndlMF1aEtYkgw7XbFNm8aeo
c6gAn1uM47QhtSX9gjsJ3AKCHStjWos8
=TeqW
-----END PGP SIGNATURE-----

--MGYHOYXEY6WxJCY8--

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC