what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

iglooftp.txt

iglooftp.txt
Posted Dec 30, 2004
Authored by Manigandan Radhakrishnan

A weakness when uploading directories recursively can potentially be exploited by malicious, local users to substitute the uploaded files in IglooFTP version 0.6.1.

tags | advisory, local
SHA-256 | f9196ada991d3ff2e19aff394388176d2abd752aa76bdc0a2dfb9da562f0fa39

iglooftp.txt

Change Mirror Download
From djb@cr.yp.to Wed Dec 15 14:23:31 2004
Date: 15 Dec 2004 08:34:01 -0000
From: D. J. Bernstein <djb@cr.yp.to>
To: securesoftware@list.cr.yp.to, bug@iglooftp.com
Subject: [local] [control] IglooFTP 0.6.1 uses fopen in /tmp

Manigandan Radhakrishnan, a student in my Fall 2004 UNIX Security Holes
course, has discovered a locally exploitable security hole in IglooFTP,
at least version 0.6.1 (the current version in FreeBSD ports). I'm
publishing this notice, but all the discovery credits should be assigned
to Radhakrishnan.

You are at risk if you use IglooFtp to recursively upload a directory.
Any user with an account on the same machine can, with enough effort,
substitute his own files for the files you are uploading.

Here's the bug: IglooFtp uses fopen(...,"w") on a filename returned by
tmpnam(). There is no O_EXCL protection on the open; fopen() will
happily write to an attacker-owned file, so the attacker can change the
file contents later. Some operating systems try to make the filename
hard to guess---FreeBSD, for example, uses cryptographic random numbers
to generate one of 57 billion possible filenames---but this level of
randomness is not sufficient to stop a persistent attacker.

---D. J. Bernstein, Associate Professor, Department of Mathematics,
Statistics, and Computer Science, University of Illinois at Chicago
Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close