Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 02 May 2002 16:09:04 -0500
From:      Jorge Biquez <jbiquez@icsmx.com>
To:        freebsd-questions@FreeBSD.ORG
Subject:   FTP on 4.4.STABLE with problems?
Message-ID:  <5.1.0.14.2.20020502160148.03248c50@icsmx.com>

next in thread | raw e-mail | index | archive | help
--=====================_18609797==_.ALT
Content-Type: text/plain; charset="us-ascii"; format=flowed

Hello all.

On the company I'm working a client asked for a server for their simple and 
plain web pages. They asked for an FTP account and Apache configured. They 
have been working without problems. Since last month a new area of the IT 
department is "auditing" the server remotely and are asking for fixing the 
things they found wrong (or they believe it is wrong). According to them 
the FTP that is running by default on the 4.4.-STABLE version has problems. 
"Their automated report says it". I'm including the message they sent me at 
the end of this email.
Any similar experiences on this?
What have you done with clients like this that think that "the server they 
ordered to configure is wrong configured"?.
Does the FTP really need to be fixed?

Thanks in advance for your comments on the FTP issue also.

Jorge Biquez


-------This is what they sent me as result of their auditing-----
FTPD glob Heap Corruption
ftp (21/tcp)
You seem to be running an FTP server which is vulnerable to the
'glob heap corruption' flaw.
An attacker may use this problem to execute arbitrary commands on this host.

*** As Nessus solely relied on the banner of the server to issue this warning,
*** so this alert might be a false positive

Solution : Upgrade your ftp server software to the latest version.
Risk factor : High

CVE : CAN-2001-0550
Related Security Advisory Cross Reference(s)
Common Vulnerability Exposure (CVE) ID: CAN-2001-0550
http://www.securityfocus.com/archive/82/180823
Bugtraq mailing list: 20011128 CORE-20011001: Wu-FTP glob heap corruption 
vulnerability
http://marc.theaimsgroup.com/?l=bugtraq&m=100700363414799&w=2
Cert/CC Advisory: CA-2001-33
http://www.cert.org/advisories/CA-2001-33.html
CERT/CC vulnerability note: VU#886083
http://www.kb.cert.org/vuls/id/886083
RedHat Security Advisories: RHSA-2001-157
http://www.redhat.com/support/errata/RHSA-2001-157.html
Caldera Security Advisory: CSSA-2001-041.0
http://www.caldera.com/support/security/advisories/CSSA-2001-041.0.txt
http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-090.php3
HPdes Security Advisory: HPSBUX0107-162
ISS Security Advisory: 20011129 WU-FTPD Heap Corruption Vulnerability
BugTraq ID: 3581
http://www.securityfocus.com/bid/3581
-------------------------------------------------

--=====================_18609797==_.ALT
Content-Type: text/html; charset="us-ascii"

<html>
Hello all.<br><br>
On the company I'm working a client asked for a server for their simple
and plain web pages. They asked for an FTP account and Apache configured.
They have been working without problems. Since last month a new area of
the IT department is &quot;auditing&quot; the server remotely and are
asking for fixing the things they found wrong (or they believe it is
wrong). According to them the FTP that is running by default on the
4.4.-STABLE version has problems. &quot;Their automated report says
it&quot;. I'm including the message they sent me at the end of this
email.<br>
Any similar experiences on this? <br>
What have you done with clients like this that think that &quot;the
server they ordered to configure is wrong configured&quot;?.<br>
Does the FTP really need to be fixed?<br><br>
Thanks in advance for your comments on the FTP issue also.<br><br>
Jorge Biquez<br><br>
<br>
-------This is what they sent me as result of their auditing-----<br>
FTPD glob Heap Corruption<br>
ftp (21/tcp)<br>
You seem to be running an FTP server which is vulnerable to the<br>
'glob heap corruption' flaw.<br>
An attacker may use this problem to execute arbitrary commands on this
host.<br><br>
*** As Nessus solely relied on the banner of the server to issue this
warning,<br>
*** so this alert might be a false positive<br><br>
Solution : Upgrade your ftp server software to the latest version.<br>
Risk factor : High<br><br>
CVE : CAN-2001-0550<br>
Related Security Advisory Cross Reference(s)<br>
<font color="#0000FF"><u>Common Vulnerability Exposure (CVE) ID:
CAN-2001-0550<br>
<a href="http://www.securityfocus.com/archive/82/180823" eudora="autourl">http://www.securityfocus.com/archive/82/180823</a><br>;
</u></font>Bugtraq mailing list: 20011128 CORE-20011001: Wu-FTP glob heap
corruption vulnerability<br>
<font color="#0000FF"><u><a href="http://marc.theaimsgroup.com/?l=bugtraq&amp;m=100700363414799&amp;w=2" eudora="autourl">http://marc.theaimsgroup.com/?l=bugtraq&amp;m=100700363414799&amp;w=2</a><br>;
Cert/CC Advisory: CA-2001-33<br>
<a href="http://www.cert.org/advisories/CA-2001-33.html" eudora="autourl">http://www.cert.org/advisories/CA-2001-33.html</a><br>;
</u></font>CERT/CC vulnerability note: VU#886083<br>
<font color="#0000FF"><u><a href="http://www.kb.cert.org/vuls/id/886083" eudora="autourl">http://www.kb.cert.org/vuls/id/886083</a><br>;
</u></font>RedHat Security Advisories: RHSA-2001-157<br>
<font color="#0000FF"><u><a href="http://www.redhat.com/support/errata/RHSA-2001-157.html" eudora="autourl">http://www.redhat.com/support/errata/RHSA-2001-157.html</a><br>;
Caldera Security Advisory: CSSA-2001-041.0<br>
<a href="http://www.caldera.com/support/security/advisories/CSSA-2001-041.0.txt" eudora="autourl">http://www.caldera.com/support/security/advisories/CSSA-2001-041.0.txt</a><br>;
<a href="http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-090.php3" eudora="autourl">http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-090.php3</a><br>;
</u></font>HPdes Security Advisory: HPSBUX0107-162<br>
ISS Security Advisory: 20011129 WU-FTPD Heap Corruption
Vulnerability<br>
<font color="#0000FF"><u>BugTraq ID: 3581<br>
<a href="http://www.securityfocus.com/bid/3581" eudora="autourl">http://www.securityfocus.com/bid/3581</a><br>;
-------------------------------------------------</font></u><br>
</html>

--=====================_18609797==_.ALT--


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-questions" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?5.1.0.14.2.20020502160148.03248c50>