Korean
<< Back
VID 16053
Severity 40
Port 21
Protocol TCP
Class FTP
Detailed Description The HP-UX ftpd contains a glob() expansion STAT buffer overflow vulnerability.
Hewlett Packard's HP-UX ftpd version 11.04 or prior contain a stack-based buffer overflow condition. The overflow occurs when the STAT command is issued with an argument that expands into an oversized string after being processed by glob(). It may be possible for remote attackers to exploit this vulnerability and execute arbitrary code on the affected host.
To exploit this, the attacker must be able to create directories on the target host.

* References:
http://www.nai.com/research/covert/advisories/048.asp
http://www.cert.org/advisories/CA-2001-07.html
http://www.securityfocus.com/advisories/3456

* Platforms Affected:
HP-UX 10.01, 10.10, 10.20, 11.00
HP-UX 10.24 (VVOS), 11.04 (VVOS)
Recommendation Apply the appropriate patch for your system, available from the Hewlett Packard's web site, http://itrc.hp.com

HP HP-UX 10.01: HP Patch PHNE_23947
HP HP-UX 10.10: HP Patch PHNE_23947
HP HP-UX 10.20: HP Patch PHNE_23948
HP HP-UX (VVOS) 10.24: HP Patch PHNE_24394
HP HP-UX 11.00: HP Patch PHNE_23949
HP HP-UX (VVOS) 11.0.4: HP Patch PHNE_24395

A workaround is to disable the ftp service until patches are available. If this is not feasible, restrict access to the service. Ensure that anonymous users cannot create or write to any directories.

For information on the Security Patch Check tool for the HP-UX, see:
http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=B6834AA

The security patch matrix is also available via anonymous ftp:
ftp://ftp.itrc.hp.com/export/patches/hp-ux_patch_matrix
Related URL CVE-2001-0248 (CVE)
Related URL 2552 (SecurityFocus)
Related URL 6332 (ISS)