Korean
<< Back
VID 16068
Severity 40
Port 21
Protocol TCP
Class FTP
Detailed Description The WU-FTPD, according to its version number, has 'chmod' and S/Key Vulnerabilities.
WU-FTPD (Washington University FTP daemon) is a FTP server based on the BSD FTP daemon for Linux distributions. WU-FTPD 2.6.2 and earlier are vulnerable to two vulnerabilities below:

1. 'chmod' command - When configured with "restricted-gid home" feature supported by WU-FTPD, an unauthorized user could use this flaw to circumvent the configured home directory restriction.
2. S/Key login handling - On servers using S/Key authentication, a remote attacker could overflow a buffer and potentially execute arbitrary code.

* Note: This check solely relied on the version number of the remote FTP server to assess this vulnerability, so this might be a false positive.

* References:
http://www.ciac.org/ciac/bulletins/o-095.shtml
http://secunia.com/advisories/11055/

* Platforms Affected:
Washington University wu-ftpd 2.6.2 and earlier
Red Hat Advanced Workstation 2.1
Red Hat Enterprise Linux 2.1AS
Red Hat Enterprise Linux 2.1ES
Debian Linux 3.0
Linux Any version
Recommendation Apply the patch available at ftp://ftp.wu-ftpd.org/pub/wu-ftpd/patches/apply_to_2.6.2/skeychallenge.patch

-- OR --

Upgrade to WU-FTPD version 2.6.3 or later, when new fixed version becomes available from the WU-FTP Web site at http://www.wu-ftpd.org

For Debian GNU/Linux 3.0 (woody):
Upgrade to the latest wu-ftpd package (2.6.2-3woody4 or later), as listed in Debian Security Advisory DSA-457-1 at http://www.debian.org/security/2004/dsa-457

For Red Hat Linux:
Upgrade to the latest wu-ftpd package, as listed in Red Hat Security Advisory RHSA-2004:096-09 at https://rhn.redhat.com/errata/RHSA-2004-096.html

For other distributions:
Contact your vendor for upgrade or patch information.
Related URL CVE-2004-0148 (CVE)
Related URL 9832 (SecurityFocus)
Related URL 15423 (ISS)