Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 10 Nov 2010 17:50:10 GMT
From:      Tom Judge <tom@tomjudge.com>
To:        freebsd-ports-bugs@FreeBSD.org
Subject:   Re: misc/152100: found an exploit on freebsd, "known to work" , in an infected (linux) machine
Message-ID:  <201011101750.oAAHoAeU059506@freefall.freebsd.org>

next in thread | raw e-mail | index | archive | help
The following reply was made to PR ports/152100; it has been noted by GNATS.

From: Tom Judge <tom@tomjudge.com>
To: Michel van Gruijthuijsen <mistige@gmail.com>
Cc: freebsd-gnats-submit@FreeBSD.org
Subject: Re: misc/152100: found an exploit on freebsd, "known to work" ,	in
 an infected (linux) machine
Date: Wed, 10 Nov 2010 11:48:44 -0600

 This is a multi-part message in MIME format.
 --------------070004060805040004020007
 Content-Type: text/plain; charset=ISO-8859-1
 Content-Transfer-Encoding: 7bit
 
 Sorry that should have been:
 
 http://www.zerodayinitiative.com/advisories/ZDI-10-229/
 
 Not the aforementioned CVE.
 
 Attached is a vuxml entry for this.
 
 
 Tom
 
 -- 
 TJU13-ARIN
 
 --------------070004060805040004020007
 Content-Type: text/plain;
  name="vuln.txt"
 Content-Transfer-Encoding: 7bit
 Content-Disposition: attachment;
  filename="vuln.txt"
 
   <vuln vid="aa9bf1e5-eced-11df-a00a-000c29d1636d">
     <topic>ProFTPD TELNET_IAC Remote Code Execution Vulnerability </topic>
     <affects>
       <package>
 	<name>proftpd</name>
 	<name>proftpd-devel</name>
 	<name>proftpd-mysql</name>
 	<range>
     <lt>1.3.3c</lt>
   </range>
       </package>
     </affects>
     <description>
       <body xmlns="http://www.w3.org/1999/xhtml">;
 	<p>Anonymous reports:</p>
 	<blockquote cite="http://www.zerodayinitiative.com/advisories/ZDI-10-229/">;
 	  <p>This vulnerability allows remote attackers to execute arbitrary code on 
     vulnerable installations of ProFTPD. Authentication is not required to exploit 
     this vulnerability.
     
     The flaw exists within the proftpd server component which listens by default on 
     TCP port 21. When reading user input if a TELNET_IAC escape sequence is 
     encountered the process miscalculates a buffer length counter value allowing a 
     user controlled copy of data to a stack buffer. A remote attacker can exploit 
     this vulnerability to execute arbitrary code under the context of the proftpd 
     process.</p>
 	</blockquote>
       </body>
     </description>
     <references>
       <freebsdpr>ports/152100</freebsdpr>
       <url>http://www.zerodayinitiative.com/advisories/ZDI-10-229/</url>;
     </references>
     <dates>
       <discovery>2010-9-24</discovery>
       <entry>2010-11-10</entry>
     </dates>
   </vuln>
 
 
 --------------070004060805040004020007--



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201011101750.oAAHoAeU059506>