File: 1377.txt

package info (click to toggle)
snort 2.7.0-20.4
  • links: PTS
  • area: main
  • in suites: lenny
  • size: 34,512 kB
  • ctags: 18,772
  • sloc: ansic: 115,404; sh: 10,893; makefile: 1,372; perl: 487; sql: 213
file content (72 lines) | stat: -rw-r--r-- 1,703 bytes parent folder | download | duplicates (4)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
Rule:

--
Sid:
1377

--
Summary:
This event is generated when an attempt is made to exploit a file
globbing vulnerability associated with WU-FTPD.

--
Impact:
Serious. Remote root access. A successful attack can allow remote
execution of commands with privileges of WU-FTPD, most often root.

--
Detailed Information:
An exploit in Washington University FTP daemon (WU-FTPD) code associated
with file globbing can allow execution of arbitrary code with the
privileges of WU-FTPD, typically root. WU-FTPD invokes the glob function
when certain characters are used in a file name argument supplied by an
FTP client. The glob function fails to properly handle illegal strings
such as "~{" and "~[". The problem is compounded when the glob function
returns an error condition that is incorrectly handled, which may lead
to the corruption of process memory space. This exploit requires login
access to a vulnerable server either via an anonymous or established
user account.

--
Affected Systems:
	WU-FTPD 2.6.1, 2.6.0, and 2.5.0.

--
Attack Scenarios:
An attacker may login to a vulnerable WU-FTP server and enter a
malformed file argument to gain access and execute arbitrary commands.

--
Ease of Attack:
Simple.  

--
False Positives:
None Known.

--
False Negatives:
None Known.

--
Corrective Action:
Upgrade to the latest non-affected version of the software

Apply the appropriate vendor supplied patch.

Do not enable anonymous FTP access unless required.  

--
Contributors:
Sourcefire Research Team
Brian Caswell <bmc@sourcefire.com> 
Nigel Houghton <nigel.houghton@sourcefire.com>
Judy Novak <judy.novak@sourcefire.com>

--
Additional References:

CERT:
http://www.kb.cert.org/vuls/id/886083

--