what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

CA-2001-07.ftp.glob

CA-2001-07.ftp.glob
Posted Apr 10, 2001
Site cert.org

CERT Advisory CA-2001-07 - Many FTP servers have remote vulnerabilities in filename expansion due to the glob() function which allow arbitrary code execution. Vulnerable FTP servers include OpenBSD, NetBSD, FreeBSD, Irix, HPUX 11, and Solaris 8.

tags | remote, arbitrary, vulnerability, code execution
systems | netbsd, solaris, freebsd, irix, openbsd, hpux
SHA-256 | 809c9d0e40e40d5ec796bd833496f52b16bd9671042bef29959a533565d6676b

CA-2001-07.ftp.glob

Change Mirror Download

-----BEGIN PGP SIGNED MESSAGE-----

CERT Advisory CA-2001-07 File Globbing Vulnerabilities in Various FTP
Servers

Original release date: April 10, 2001
Last revised: --
Source: CERT/CC

A complete revision history can be found at the end of this file.

Systems Affected

FTP servers on various platforms

Overview

A variety of FTP servers incorrectly manage buffers in a way that can
lead to remote intruders executing arbitrary code on the FTP server.
The incorrect management of buffers is centered around the return from
the glob() function, and may be confused with a related
denial-of-service problem. These problems were discovered by the
COVERT Labs at PGP Security.

I. Description

Filename "globbing" is the process of expanding short-hand notation
into complete file names. For example, the expression "*.c" (without
the quotes) is short-hand notation for "all files ending in ".c"
(again, without the quotes). This is commonly used in UNIX shells, in
commands such as ls *.c. Globbing also often includes the expansion of
certain characters into system-specific paths, such as the expansion
of tilde character (~) into the path of the home directory of the user
specified to the right of the tilde character. For example, "~foo"
expands to the home directory for the user "foo" on the current
system. The expressions used in filename globbing are not strictly
regular expressions, but they are syntactically similar in many ways.

Many FTP servers also implement globbing, so that the command mget *.c
means retrieve all the files ending in ".c," and get ~foo/file.name
means get the file named "file.name" in the home directory of foo.

The COVERT Labs at PGP Security have discovered a means to use the
expansion done by the glob function to overflow various buffers in FTP
servers, allowing an intruder to execute arbitrary code. For more
details about their discovery, see

http://www.pgp.com/research/covert/advisories/048.asp

Quoting from that document:

[...] when an FTP daemon receives a request involving a file
that has a tilde as its first character, it typically runs the
entire filename string through globbing code in order to
resolve the specified home directory into a full path. This has
the side effect of expanding other metacharacters in the
pathname string, which can lead to very large input strings
being passed into the main command processing routines. This
can lead to exploitable buffer overflow conditions, depending
upon how these routines manipulate their input.

For the latest information regarding this vulnerability, including
information related to vendors' exposure to this problem, consult the
vulnerability note describing this problem, available at

http://www.kb.cert.org/vuls/id/808552

II. Impact

Intruders can execute arbitrary code with the permissions of the
process running the FTP server.

III. Solution

Apply a patch or workaround from your vendor, as described in Appendix
A.

Appendix A. - Vendor Information

This appendix contains information provided by vendors for this
advisory. When vendors report new information to the CERT/CC, we
update this section and note the changes in our revision history. If a
particular vendor is not listed below, we have not received their
comments.

Compaq Computer Corporation

COMPAQ COMPUTER CORPORATION

-----------------------------
x-ref: J Compaq case id - SSRT1-83

At the time of writing this document, Compaq is currently
investigating the potential impact to Compaq's ftp service.

Initial tests indicate Compaq's ftp service is not vulnerable.

As further information becomes available Compaq will provide notice of
the completion/availibility of any necessary patches through AES
services (DIA,DSNlink FLASH and posted to the Services WEB page) and
be available from your normal Compaq Services Support channel.

COMPAQ COMPUTER CORPORATION

FreeBSD, Inc.

FreeBSD is vulnerable to the glob-related bugs. We have corrected
these bugs in FreeBSD 5.0-CURRENT and FreeBSD 4.2-STABLE, and they
will not be present in FreeBSD 4.3-RELEASE.

Fujitsu

[...] we have determined that the versions of UXP/V shown below are
vulnerable. JPatches are being prepared and will be assigned the patch
numbers also shown below:

OS Version,PTF level patch ID
-------------------- --------
UXP/V V20L10 X01021 UX28161
UXP/V V20L10 X00091 UX28160
UXP/V V10L20 X01041 UX15527

IBM Corporation

[...] we have not found the described vulnerabilities to exist in the
AIX versions of glob as used in the ftp daemon.

NetBSD

Please be aware that as of March 29, 2001, NetBSD has a fix for both
the glob resource consumption (via an application controlled
GLOB_LIMIT flag) and the buffer overflow (always enforced). These
fixes should work on any 4.4BSD derived glob(3).

SGI

SGI acknowledges the vulnerability reported by NAI COVERT Labs and is
currently investigating. No further information is available at this
time.

As further information becomes available, additional advisories will
be issued via the normal SGI security information distribution methods
including the wiretap mailing list and
http://www.sgi.com/support/security/

For the protection of all our customers, SGI does not disclose,
discuss or confirm vulnerabilities until a full investigation has
occurred and any necessary patch(es) or release streams are available
for all vulnerable and supported IRIX operating systems.

Until SGI has more definitive information to provide, customers are
encouraged to assume all security vulnerabilities as exploitable and
take appropriate steps according to local site security policies and
requirements.
_________________________________________________________________

The CERT Coordination Center would like to thank the COVERT Labs at
PGP Security for notifying us about this problem and for their help in
constructing this advisory.
_________________________________________________________________

Author: Shawn V. Hernan
______________________________________________________________________

This document is available from:
http://www.cert.org/advisories/CA-2001-07.html
______________________________________________________________________

CERT/CC Contact Information

Email: cert@cert.org
Phone: +1 412-268-7090 (24-hour hotline)
Fax: +1 412-268-6989
Postal address:
CERT Coordination Center
Software Engineering Institute
Carnegie Mellon University
Pittsburgh PA 15213-3890
U.S.A.

CERT personnel answer the hotline 08:00-20:00 EST(GMT-5) / EDT(GMT-4)
Monday through Friday; they are on call for emergencies during other
hours, on U.S. holidays, and on weekends.

Using encryption

We strongly urge you to encrypt sensitive information sent by email.
Our public PGP key is available from

http://www.cert.org/CERT_PGP.key

If you prefer to use DES, please call the CERT hotline for more
information.

Getting security information

CERT publications and other security information are available from
our web site

http://www.cert.org/

To subscribe to the CERT mailing list for advisories and bulletins,
send email to majordomo@cert.org. Please include in the body of your
message

subscribe cert-advisory

* "CERT" and "CERT Coordination Center" are registered in the U.S.
Patent and Trademark Office.
______________________________________________________________________

NO WARRANTY
Any material furnished by Carnegie Mellon University and the Software
Engineering Institute is furnished on an "as is" basis. Carnegie
Mellon University makes no warranties of any kind, either expressed or
implied as to any matter including, but not limited to, warranty of
fitness for a particular purpose or merchantability, exclusivity or
results obtained from use of the material. Carnegie Mellon University
does not make any warranty of any kind with respect to freedom from
patent, trademark, or copyright infringement.
_________________________________________________________________

Conditions for use, disclaimers, and sponsorship information

Copyright 2001 Carnegie Mellon University.

Revision History
April 10, 2001: Initial release

-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 5.0i for non-commercial use
Charset: noconv

iQCVAwUBOtKikQYcfu8gsZJZAQGkKwP/eOBWALC40IYzNuMzoQjwpymdAiur388D
it9JqLeSlAJEdfloJU8JQ7s+X0pGXwa2cPPffZr0svVcLvHuvX5NTUd7jTbBmc24
jpDJ2hSr9RroP9O2EmP2/vuGVt1NRE1D2Gs0vc1sXmhWSEYez9AzrEFZNjhOtBd2
6lxAbas5WTU=
=omCR
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close