exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

tnftp.txt

tnftp.txt
Posted Dec 30, 2004
Authored by Yosef Klein | Site tigger.uic.edu

A flaw in tnftp exists where it fails to properly validate file names provided by the server. Successful exploitation allows overwriting local files, but requires that a user connects to a malicious ftp server and downloads files.

tags | advisory, local
SHA-256 | dff05585de9e9d4b5e8f328f1cf7e188ee8c4a393bf6e1515fd472aea30727e7

tnftp.txt

Change Mirror Download
From djb@cr.yp.to Wed Dec 15 14:22:51 2004
Date: 15 Dec 2004 08:28:52 -0000
From: D. J. Bernstein <djb@cr.yp.to>
To: securesoftware@list.cr.yp.to, lukem@netbsd.org
Subject: [remote] [control] tnftp 20030825 does not check for directory
escapes

Yosef Klein, a student in my Fall 2004 UNIX Security Holes course, has
discovered a remotely exploitable security hole in tnftp, an FTP client,
version 20030825 (current at least in FreeBSD ports). I'm publishing
this notice, but all the discovery credits should be assigned to Klein.

You are at risk if you use tnftp to download a batch of files from an
FTP server. Anyone who provides an FTP response to tnftp (not
necessarily the legitimate server administrator; an attacker can modify
FTP responses passing through the network) then has complete control
over your account: he can read and modify your files, watch the programs
you're running, etc.

The bug is triggered by the server sending a file name with slashes,
such as /home/you/.cshrc. The mget() function in cmds.c blindly uses the
server's file name (cp) as a local file name (tp passed to recvrequest);
users normally expect file-transfer programs to check for escapes from
the current directory.

---D. J. Bernstein, Associate Professor, Department of Mathematics,
Statistics, and Computer Science, University of Illinois at Chicago
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close