Date: Thu, 02 May 2002 16:09:04 -0500 From: Jorge Biquez <jbiquez@icsmx.com> To: freebsd-questions@FreeBSD.ORG Subject: FTP on 4.4.STABLE with problems? Message-ID: <5.1.0.14.2.20020502160148.03248c50@icsmx.com>
next in thread | raw e-mail | index | archive | help
--=====================_18609797==_.ALT Content-Type: text/plain; charset="us-ascii"; format=flowed Hello all. On the company I'm working a client asked for a server for their simple and plain web pages. They asked for an FTP account and Apache configured. They have been working without problems. Since last month a new area of the IT department is "auditing" the server remotely and are asking for fixing the things they found wrong (or they believe it is wrong). According to them the FTP that is running by default on the 4.4.-STABLE version has problems. "Their automated report says it". I'm including the message they sent me at the end of this email. Any similar experiences on this? What have you done with clients like this that think that "the server they ordered to configure is wrong configured"?. Does the FTP really need to be fixed? Thanks in advance for your comments on the FTP issue also. Jorge Biquez -------This is what they sent me as result of their auditing----- FTPD glob Heap Corruption ftp (21/tcp) You seem to be running an FTP server which is vulnerable to the 'glob heap corruption' flaw. An attacker may use this problem to execute arbitrary commands on this host. *** As Nessus solely relied on the banner of the server to issue this warning, *** so this alert might be a false positive Solution : Upgrade your ftp server software to the latest version. Risk factor : High CVE : CAN-2001-0550 Related Security Advisory Cross Reference(s) Common Vulnerability Exposure (CVE) ID: CAN-2001-0550 http://www.securityfocus.com/archive/82/180823 Bugtraq mailing list: 20011128 CORE-20011001: Wu-FTP glob heap corruption vulnerability http://marc.theaimsgroup.com/?l=bugtraq&m=100700363414799&w=2 Cert/CC Advisory: CA-2001-33 http://www.cert.org/advisories/CA-2001-33.html CERT/CC vulnerability note: VU#886083 http://www.kb.cert.org/vuls/id/886083 RedHat Security Advisories: RHSA-2001-157 http://www.redhat.com/support/errata/RHSA-2001-157.html Caldera Security Advisory: CSSA-2001-041.0 http://www.caldera.com/support/security/advisories/CSSA-2001-041.0.txt http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-090.php3 HPdes Security Advisory: HPSBUX0107-162 ISS Security Advisory: 20011129 WU-FTPD Heap Corruption Vulnerability BugTraq ID: 3581 http://www.securityfocus.com/bid/3581 ------------------------------------------------- --=====================_18609797==_.ALT Content-Type: text/html; charset="us-ascii" <html> Hello all.<br><br> On the company I'm working a client asked for a server for their simple and plain web pages. They asked for an FTP account and Apache configured. They have been working without problems. Since last month a new area of the IT department is "auditing" the server remotely and are asking for fixing the things they found wrong (or they believe it is wrong). According to them the FTP that is running by default on the 4.4.-STABLE version has problems. "Their automated report says it". I'm including the message they sent me at the end of this email.<br> Any similar experiences on this? <br> What have you done with clients like this that think that "the server they ordered to configure is wrong configured"?.<br> Does the FTP really need to be fixed?<br><br> Thanks in advance for your comments on the FTP issue also.<br><br> Jorge Biquez<br><br> <br> -------This is what they sent me as result of their auditing-----<br> FTPD glob Heap Corruption<br> ftp (21/tcp)<br> You seem to be running an FTP server which is vulnerable to the<br> 'glob heap corruption' flaw.<br> An attacker may use this problem to execute arbitrary commands on this host.<br><br> *** As Nessus solely relied on the banner of the server to issue this warning,<br> *** so this alert might be a false positive<br><br> Solution : Upgrade your ftp server software to the latest version.<br> Risk factor : High<br><br> CVE : CAN-2001-0550<br> Related Security Advisory Cross Reference(s)<br> <font color="#0000FF"><u>Common Vulnerability Exposure (CVE) ID: CAN-2001-0550<br> <a href="http://www.securityfocus.com/archive/82/180823" eudora="autourl">http://www.securityfocus.com/archive/82/180823</a><br> </u></font>Bugtraq mailing list: 20011128 CORE-20011001: Wu-FTP glob heap corruption vulnerability<br> <font color="#0000FF"><u><a href="http://marc.theaimsgroup.com/?l=bugtraq&m=100700363414799&w=2" eudora="autourl">http://marc.theaimsgroup.com/?l=bugtraq&m=100700363414799&w=2</a><br> Cert/CC Advisory: CA-2001-33<br> <a href="http://www.cert.org/advisories/CA-2001-33.html" eudora="autourl">http://www.cert.org/advisories/CA-2001-33.html</a><br> </u></font>CERT/CC vulnerability note: VU#886083<br> <font color="#0000FF"><u><a href="http://www.kb.cert.org/vuls/id/886083" eudora="autourl">http://www.kb.cert.org/vuls/id/886083</a><br> </u></font>RedHat Security Advisories: RHSA-2001-157<br> <font color="#0000FF"><u><a href="http://www.redhat.com/support/errata/RHSA-2001-157.html" eudora="autourl">http://www.redhat.com/support/errata/RHSA-2001-157.html</a><br> Caldera Security Advisory: CSSA-2001-041.0<br> <a href="http://www.caldera.com/support/security/advisories/CSSA-2001-041.0.txt" eudora="autourl">http://www.caldera.com/support/security/advisories/CSSA-2001-041.0.txt</a><br> <a href="http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-090.php3" eudora="autourl">http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-090.php3</a><br> </u></font>HPdes Security Advisory: HPSBUX0107-162<br> ISS Security Advisory: 20011129 WU-FTPD Heap Corruption Vulnerability<br> <font color="#0000FF"><u>BugTraq ID: 3581<br> <a href="http://www.securityfocus.com/bid/3581" eudora="autourl">http://www.securityfocus.com/bid/3581</a><br> -------------------------------------------------</font></u><br> </html> --=====================_18609797==_.ALT-- To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-questions" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?5.1.0.14.2.20020502160148.03248c50>