Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2000.170 -- NetBSD Security Advisory 2000-009 ftpd setproctitle vulnerability 14 July 2000 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: ftpd Vendor: NetBSD Operating System: NetBSD Platform: N/A Impact: Execute Arbitrary Code/Commands Access Required: Remote - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- NetBSD Security Advisory 2000-009 ================================= Topic: ftpd setproctitle vulnerability. Version: All releases before 2000/07/08 Severity: High: Potential remote root access. Abstract ======== An improper use of the setproctitle() library function by ftpd may allow a malicious remote ftp client to subvert an FTP server, including possibly getting remote access to a system. Technical Details ================= The BSD setproctitle() function, like printf(), accepts a format string and a variable number of arguments; the format string is interpreted to determine how to display the other arguments to the function. If the format string can contain arbitrary user-supplied data, it may be possible to trick the program into reading or writing arbitrary memory locations, resulting in a security compromise. A more extensive audit of the NetBSD sources for problems of this form is under way. Solutions and Workarounds ========================= This problem affects all versions of NetBSD. Patches are available for the NetBSD-1.4 series of releases. If you're runing NetBSD 1.4, 1.4.1, or 1.4.2, fetch the following patch, apply it to src/libexec/ftpd/ftpd.c using the patch(1) command, rebuild and reinstall ftpd, and kill off any existing FTP daemons (to ensure that any improperly granted access is revoked). ftp://ftp.NetBSD.ORG/pub/NetBSD/misc/security/patches/20000708-ftpd If you're running a version of NetBSD-current or the NetBSD 1.5 branch from before 2000/07/05, you should update to a newer version of NetBSD-current. Similarly, if you're running a version of NetBSD-release (NetBSD 1.4 branch) from before 2000/07/08, you should update to a newer version of NetBSD-release. Thanks To ========= Jun-ichiro Hagino <itojun@netbsd.org> Revision History ================ 20000708 Initial version. More Information ================ Information about NetBSD and NetBSD security can be found at http://www.NetBSD.ORG/ and http://www.NetBSD.ORG/Security/. Copyright 2000, The NetBSD Foundation, Inc. All Rights Reserved. $NetBSD: NetBSD-SA2000-009.txt,v 1.1 2000/07/08 21:03:11 sommerfeld Exp $ - -----BEGIN PGP SIGNATURE----- Version: 2.6.3ia Charset: noconv iQCVAwUBOWnDfD5Ru2/4N2IFAQE7ZAP8CH2tz0srgbkJ05PEtc83EUG5FvMetSBC OG45edFGtMRfpRkJWL30DoqCmvIzxRWa0sVgFfc/78gS1eW6R0SdunSDM3sQ39Vp thpsj/+hqUnuwFpm+fdiIFsLQjsgaqZpceaWSogJxGLj6SCepNouED2XeI46PABR pGowBD6r0gk= =OXnj - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to use any or all of this information is the responsibility of each user or organisation, and should be done so in accordance with site policies and procedures. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the original authors to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/Information/advisories.html If you believe that your system has been compromised, contact AusCERT or your representative in FIRST (Forum of Incident Response and Security Teams). Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for emergencies. -----BEGIN PGP SIGNATURE----- Version: 2.6.3i Charset: noconv Comment: ftp://ftp.auscert.org.au/pub/auscert/AUSCERT_PGP.key iQCVAwUBOXXUCyh9+71yA2DNAQGPvgP/QpsRMj8nQg4ju4kkB+OL7C4sutUkpYwD riEnDc3VfccolOyysyEhPSkndM9aold5Cw8GOr1ZrkuMoVYUsiG8VWxl06LEQJ10 Ye4tD9zgQhdaZmukmyjkVNlT2+TwxvMMmpoNCj3g8OJDDDOwhnkrDh84px9vOLsP DbWa4fYyDAI= =nuKE -----END PGP SIGNATURE-----