SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (File Transfer/Sharing)  >   Wu-ftpd Vendors:   WU-FTPD Development Group
(Caldera Issues Fix) WU-FTPD File Globbing Character Bug Allows Remote Users to Obtain Root-Level Privileges on the Server
SecurityTracker Alert ID:  1002848
SecurityTracker URL:  http://securitytracker.com/id/1002848
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Nov 29 2001
Impact:   Execution of arbitrary code via network, Root access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 2.6.1-18 and prior
Description:   Red Hat reported a vulnerability in the WU-FTPD FTP server. An error in expanding (globbing) file names may allow remote users to execute arbitrary code on the FTP server.

It is reported that a remote user with access to an FTP server account (including anonymous access) can specify a "file globbing" pattern where the server will attempt to find matching files based on the pattern. If a malformed globbing pattern is used, the remote user can trigger the vulnerability and cause the process to overwrite memory that was not properly allocated, creating a heap overwrite condition. This may allow the remote user to execute arbitrary code on the server with the privileges of the FTP server (which is typically root level privileges).

If the globbing pattern is '~{', the error can be triggered.

Impact:   A remote user with access to the FTP server, including anonymous access, can execute arbitrary code on the server with the permissions of the FTP server (which is typically root level privileges).
Solution:   The vendor has released a fix.

For OpenLinux 2.3:

ftp://ftp.caldera.com/pub/updates/OpenLinux/2.3/current/RPMS
ftp://ftp.caldera.com/pub/updates/OpenLinux/2.3/current/SRPMS

The verification checksums are:

d6a618f9fe6a3ae99a1c54a405ab169a RPMS/wu-ftpd-2.6.1-13OL.i386.rpm
64ee3731783c12da3a5c164acb3ed239 SRPMS/wu-ftpd-2.6.1-13OL.src.rpm

Upgrade the affected packages with the following commands:

rpm -Fvh wu-ftpd-2.6.1-13OL.i386.rpm

For OpenLinux eServer 2.3.1 and OpenLinux eBuilder for ECential 3.0:

ftp://ftp.caldera.com/pub/updates/eServer/2.3/current/RPMS
ftp://ftp.caldera.com/pub/updates/eServer/2.3/current/SRPMS

The verification checksums are:

a9396078593fc3e4445d3d691df484be RPMS/wu-ftpd-2.6.1-13OL.i386.rpm
64ee3731783c12da3a5c164acb3ed239 SRPMS/wu-ftpd-2.6.1-13OL.src.rpm

Upgrade the affected packages with the following commands:

rpm -Fvh wu-ftpd-2.6.1-13OL.i386.rpm

For OpenLinux eDesktop 2.4:

ftp://ftp.caldera.com/pub/updates/eDesktop/2.4/current/RPMS
ftp://ftp.caldera.com/pub/updates/eDesktop/2.4/current/SRPMS

The verification checksums are:

3edfa831ea0d3cc94f3b7a1e1bd49723 RPMS/wu-ftpd-2.6.1-13OL.i386.rpm
64ee3731783c12da3a5c164acb3ed239 SRPMS/wu-ftpd-2.6.1-13OL.src.rpm

Upgrade the affected packages with the following commands:

rpm -Fvh wu-ftpd-2.6.1-13OL.i386.rpm

For OpenLinux 3.1 Server:

ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1/Server/current/RPMS
ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1/Server/current/SRPMS

The verification checksums are:

13e54795ceba03b48c7ac4a9c7616d70 RPMS/wu-ftpd-2.6.1-13.i386.rpm
a14359f0a93b7e82d20df2c000a81b9a SRPMS/wu-ftpd-2.6.1-13.src.rpm

Upgrade the affected packages with the following commands:

rpm -Fvh wu-ftpd-2.6.1-13.i386.rpm

Vendor URL:  www.wu-ftpd.org/ (Links to External Site)
Cause:   Boundary error, Exception handling error
Underlying OS:  Linux (Caldera/SCO)
Underlying OS Comments:  OpenLinux 2.3, OpenLinux eServer 2.3.1 and OpenLinux eBuilder, and OpenLinux eDesktop 2.4: All packages previous to wu-ftpd-2.6.1-13OL; OpenLinux Server 3.1: All packages previous to wu-ftpd-2.6.1-13

Message History:   This archive entry is a follow-up to the message listed below.
Nov 28 2001 WU-FTPD File Globbing Character Bug Allows Remote Users to Obtain Root-Level Privileges on the Server



 Source Message Contents

Subject:  Security Update [CSSA-2001-041.0] Linux - Vulnerability in wu-ftpd


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

______________________________________________________________________________
		   Caldera International, Inc.  Security Advisory

Subject:		Linux - Vulnerability in wu-ftpd
Advisory number: 	CSSA-2001-041.0
Issue date: 		2001, November 28
Cross reference:
______________________________________________________________________________


1. Problem Description

   The CoreST team has discovered a vulnerability in wu-ftpd that can be
   exploited to obtain root access to the FTP server.
   
   We recommend that customers immediately upgrade to the fixed
   version. If you do not need FTP service, remove the package.


2. Vulnerable Versions

   System                       Package
   -----------------------------------------------------------
   OpenLinux 2.3                 All packages previous to      
                                 wu-ftpd-2.6.1-13OL            
   
   OpenLinux eServer 2.3.1       All packages previous to      
   and OpenLinux eBuilder        wu-ftpd-2.6.1-13OL            
   
   OpenLinux eDesktop 2.4        All packages previous to      
                                 wu-ftpd-2.6.1-13OL            
   
   OpenLinux Server 3.1          All packages previous to      
                                 wu-ftpd-2.6.1-13              
   
   OpenLinux Workstation 3.1     not vulnerable                
   


3. Solution

   Workaround

     If you do not need wu-ftpd isntalled, remove it by running
     the following command as root:
     	
	rpm -e wu-ftpd

   The proper solution is to upgrade to the latest packages.

4. OpenLinux 2.3

    4.1 Location of Fixed Packages

       The upgrade packages can be found on Caldera's FTP site at:

       ftp://ftp.caldera.com/pub/updates/OpenLinux/2.3/current/RPMS

       The corresponding source code package can be found at:

       ftp://ftp.caldera.com/pub/updates/OpenLinux/2.3/current/SRPMS

   4.2 Verification

       d6a618f9fe6a3ae99a1c54a405ab169a  RPMS/wu-ftpd-2.6.1-13OL.i386.rpm
       64ee3731783c12da3a5c164acb3ed239  SRPMS/wu-ftpd-2.6.1-13OL.src.rpm
       

   4.3 Installing Fixed Packages

       Upgrade the affected packages with the following commands:

         rpm -Fvh wu-ftpd-2.6.1-13OL.i386.rpm
         

5. OpenLinux eServer 2.3.1 and OpenLinux eBuilder for ECential 3.0

    5.1 Location of Fixed Packages

       The upgrade packages can be found on Caldera's FTP site at:

       ftp://ftp.caldera.com/pub/updates/eServer/2.3/current/RPMS

       The corresponding source code package can be found at:

       ftp://ftp.caldera.com/pub/updates/eServer/2.3/current/SRPMS

   5.2 Verification

       a9396078593fc3e4445d3d691df484be  RPMS/wu-ftpd-2.6.1-13OL.i386.rpm
       64ee3731783c12da3a5c164acb3ed239  SRPMS/wu-ftpd-2.6.1-13OL.src.rpm
       

   5.3 Installing Fixed Packages

       Upgrade the affected packages with the following commands:

         rpm -Fvh wu-ftpd-2.6.1-13OL.i386.rpm
         

6. OpenLinux eDesktop 2.4

    6.1 Location of Fixed Packages

       The upgrade packages can be found on Caldera's FTP site at:

       ftp://ftp.caldera.com/pub/updates/eDesktop/2.4/current/RPMS

       The corresponding source code package can be found at:

       ftp://ftp.caldera.com/pub/updates/eDesktop/2.4/current/SRPMS

   6.2 Verification

       3edfa831ea0d3cc94f3b7a1e1bd49723  RPMS/wu-ftpd-2.6.1-13OL.i386.rpm
       64ee3731783c12da3a5c164acb3ed239  SRPMS/wu-ftpd-2.6.1-13OL.src.rpm
       

   6.3 Installing Fixed Packages

       Upgrade the affected packages with the following commands:

         rpm -Fvh wu-ftpd-2.6.1-13OL.i386.rpm
         

7. OpenLinux 3.1 Server

    7.1 Location of Fixed Packages

       The upgrade packages can be found on Caldera's FTP site at:

       ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1/Server/current/RPMS

       The corresponding source code package can be found at:

       ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1/Server/current/SRPMS

   7.2 Verification

       13e54795ceba03b48c7ac4a9c7616d70  RPMS/wu-ftpd-2.6.1-13.i386.rpm
       a14359f0a93b7e82d20df2c000a81b9a  SRPMS/wu-ftpd-2.6.1-13.src.rpm
       

   7.3 Installing Fixed Packages

       Upgrade the affected packages with the following commands:

         rpm -Fvh wu-ftpd-2.6.1-13.i386.rpm
         

8. OpenLinux 3.1 Workstation

    not vulnerable


9. References

   This and other Caldera security resources are located at:

   http://www.caldera.com/support/security/index.html

   This security fix closes Caldera's internal Problem Report 11023.


10. Disclaimer

   Caldera International, Inc. is not responsible for the misuse of
   any of the information we provide on this website and/or through our
   security advisories. Our advisories are a service to our customers
   intended to promote secure installation and use of Caldera OpenLinux.

11. Acknowledgements

   Caldera wishes to thank Core ST and Ivan Arce for their efforts to
   coordinate the publication of this vulnerability with all affected
   vendors.
______________________________________________________________________________
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iD8DBQE8BPPs18sy83A/qfwRAibEAJ9UyVv9Id1cAf+c/Nf3I6G0LhWi9QCdFggY
3ueP7zZUEQzVV6nWcJjzm8Y=
=TUo7
-----END PGP SIGNATURE-----

---------------------------------------------------------------------
To unsubscribe, e-mail: announce-unsubscribe@lists.caldera.com
For additional commands, e-mail: announce-help@lists.caldera.com


 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, SecurityGlobal.net LLC