Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 98329 - net-ftp/oftpd: Buffer Overflow in USER Command
Summary: net-ftp/oftpd: Buffer Overflow in USER Command
Status: RESOLVED INVALID
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High normal (vote)
Assignee: Gentoo Security
URL: http://securitytracker.com/alerts/200...
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2005-07-08 03:03 UTC by Matthias Geerdsen (RETIRED)
Modified: 2005-07-10 09:06 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Matthias Geerdsen (RETIRED) gentoo-dev 2005-07-08 03:03:17 UTC
SecurityTracker Alert ID:  1014413
SecurityTracker URL:  http://securitytracker.com/id?1014413
CVE Reference:  GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Jul 7 2005
Impact:  Denial of service via network, Execution of arbitrary code via network, User access via network
Exploit Included:  Yes  
Version(s): 0.3.7
Description:  A vulnerability was reported in oftpd. A remote user can cause the FTP service to crash or potentially execute arbitrary code.

A remote user can supply a specially crafted FTP USER command to trigger a buffer overflow.

A demonstration exploit FTP command is provided:

user \0\0\0\0\0\ (much larger string)

new.security@gmail.com is credited with discovering this vulnerability.
Impact:  A remote user can cause the target FTP service to crash or potentially execute arbitrary code.
Solution:  No solution was available at the time of this entry.
Vendor URL:  www.time-travellers.org/oftpd/ (Links to External Site)
Cause:  Boundary error 

____________

eradicator, pls verify/advise since no newer upstream version seems to be available
Comment 1 SpanKY gentoo-dev 2005-07-09 10:00:53 UTC
is there any more info ?  the reproduce case looks a bit fuzzy and the 0.3.7
code includes buffer length checking ...
Comment 2 Tavis Ormandy (RETIRED) gentoo-dev 2005-07-09 12:25:31 UTC
concur with spanky, i cant see how this would work.

"user \0\0\0\0\0\ (much larger string)"

I've tried to interpret this a number of ways, but failed to reproduce.
Comment 3 Jeremy Huddleston (RETIRED) gentoo-dev 2005-07-10 02:14:21 UTC
Yeah, I can't reproduce it... I'd like to see a complete tcpdump of the session
or something more to go on...
Comment 4 Stefan Cornelius (RETIRED) gentoo-dev 2005-07-10 09:06:52 UTC
Closing as invalid after contacting the guy who discovered the "vulnerability"
via email. Actually his client was segfaulting, not oftpd.