Korean
<< Back
VID 16052
Severity 40
Port 21
Protocol TCP
Class FTP
Detailed Description The ftp daemon derived from 4.x BSD source contains a single byte buffer overflow vulnerability. There exists a one byte overflow in the replydirname() function. By writing a null byte beyond the boundaries of a local buffer, a remote attacker can overflow the buffer and give it a user-supplied return address to execute arbitrary code as root. The attacker can use this vulnerability to gain root privileges on the target system.
This vulnerability can be exploited on systems supporting anonymous ftp if a writable directory exists (such as an "incoming" directory). This is rarely in place by default.

* References:
http://archives.neohapsis.com/archives/bugtraq/2000-12/0265.html
http://www.geocrawler.com/lists/3/OpenBSD/254/75/4767480/
http://www.kb.cert.org/vuls/id/593299

* Platforms Affected:
NetBSD Any version
OpenBSD Any version
BSD ftpd 0.3.2
Recommendation For OpenBSD 2.8:
Apply the patch, as listed in OpenBSD Security Advisory, December 18, 2000, http://www.openbsd.com/advisories/ftpd_replydirname.txt

For NetBSD Any version:
Upgrade to the latest version of NetBSD or apply the appropriate patch for your system, as listed in NetBSD Security Advisory 2000-018, http://archives.neohapsis.com/archives/netbsd/2000-q4/0271.html

For other distributions:
Contact your vendor for upgrade or patch information.
Related URL CVE-2001-0053 (CVE)
Related URL 2124 (SecurityFocus)
Related URL 5776 (ISS)