| VID |
16075 |
| Severity |
40 |
| Port |
21 |
| Protocol |
TCP |
| Class |
FTP |
| Detailed Description |
The WU-FTPD server, according to its version number, has a buffer overflow, caused by an off-by-one error in the realpath() function. The realpath() function is a C library procedure to resolve the canonical, absolute pathname of a file based on a path that may contain values such as '/', './', '../' or symbolic links. WU-FTPD 2.5.0 through 2.6.2 was reported to be vulnerable an off-by-one stack buffer overflow vulnerability in the implementation of realpath(). By submitting various FTP commands including STOR, RETR, APPE, DELE, MKD, RMD, STOU, or RNTO, along with pathnames of length MAXPATHLEN+1 to the affected server, a remote authenticated attacker could cause a denial of service or execute arbitrary code on the system with root privileges.
* Note: This check solely relied on the version number of the remote WU-FTP server to assess this vulnerability, so this might be a false positive.
* References: http://www.kb.cert.org/vuls/id/743092 http://marc.theaimsgroup.com/?l=bugtraq&m=105967301604815&w=2 http://archives.neohapsis.com/archives/vulnwatch/2003-q3/0065.html http://isec.pl/vulnerabilities/isec-0011-wu-ftpd.txt http://marc.theaimsgroup.com/?l=bugtraq&m=106002488209129&w=2 http://marc.theaimsgroup.com/?l=bugtraq&m=106001702232325&w=2
* Platforms Affected: Washington University, wu-ftpd 2.5.0 through 2.6.2 Unix Any version Linux Any version |
| Recommendation |
Apply the patch available at ftp://ftp.wu-ftpd.org/pub/wu-ftpd/patches/apply_to_2.6.2/realpath.patch
-- OR --
Upgrade to WU-FTPD version 2.6.3 or later, when new fixed version becomes available from the WU-FTPD Web site at http://www.wu-ftpd.org
For FreeBSD: Upgrade to the latest version of FreeBSD (4.8-STABLE or the latest security branch dated later than 2003-08-03), as listed in FreeBSD Security Advisory FreeBSD-03:08.realpath at ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-03:08.realpath.asc
For OpenBSD 3.3 and earlier: Apply the appropriate patch for your system, as listed in OpenBSD 015: SECURITY FIX: August 4, 2003 at http://www.openbsd.org/errata32.html#realpath
For NetBSD 1.5, 1.5.1, 1.5.2, 1.5.3, 1.6 and 1.6.1: Upgrade to the latest version of the NetBSD (NetBSD-current or the latest NetBSD 1.6 branch dated August 5, 2003 or later), as listed in NetBSD Security Advisory 2003-011 at http://archives.neohapsis.com/archives/netbsd/2003-q3/0019.html
For Mac OS X: Apply Security Update 2003-08-14, as directed in Apple Security Update 120238 at http://docs.info.apple.com/article.html?artnum=120238
For HP-UX 11.00, 11.11, and 11.22: Follow the recommended procedure, as listed in Hewlett-Packard Company Security Bulletin HPSBUX0309-277 at http://www-1.ibm.com/services/continuity/recover1.nsf/MSS/MSS-OAR-E01-2003.1102.1
For Red Hat Linux: Upgrade to the latest wu-ftpd package, as listed in Red Hat Security Advisory RHSA-2003:245-15 at https://rhn.redhat.com/errata/RHSA-2003-245.html
For Red Hat Linux containing the wu-ftpd package: Upgrade to the latest wu-ftpd package, as listed in Red Hat Security Advisory RHSA-2003:246-12 at https://rhn.redhat.com/errata/RHSA-2003-246.html
For Mandrake Linux 8.2: Upgrade to the latest version of wu-ftpd (2.6.2-1-1mdk or later), as listed in MandrakeSoft Security Advisory MDKSA-2003:080 at http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2003:080
For Debian GNU/Linux 3.0 (stable): Upgrade to the latest version of wu-ftpd (2.6.2-3woody1 or later), as listed in Debian Security Advisory DSA-357-1 at http://www.debian.org/security/2003/dsa-357
For SuSe Linux: Upgrade to the latest wu-ftpd package, as listed in SuSE Linux Security Announcement SuSE-SA:2003:032 at http://www.suse.de/de/security/2003_032_wuftpd.html
For other distributions: Contact your vendor for upgrade or patch information. |
| Related URL |
CVE-2003-0466 (CVE) |
| Related URL |
8315 (SecurityFocus) |
| Related URL |
12785 (ISS) |
|