Date: 23 Apr 2001 16:54:22 +0200 From: Dag-Erling Smorgrav <des@ofug.org> To: Victor Sudakov <sudakov@sibptus.tomsk.ru> Cc: freebsd-security@freebsd.org Subject: Re: Q: Impact of globbing vulnerability in ftpd Message-ID: <xzpae57fyzl.fsf@flood.ping.uio.no> In-Reply-To: <20010423190737.A25969@sibptus.tomsk.ru> References: <20010423111632.B17342@sibptus.tomsk.ru> <xzpitjvgbub.fsf@flood.ping.uio.no> <20010423190737.A25969@sibptus.tomsk.ru>
next in thread | previous in thread | raw e-mail | index | archive | help
Victor Sudakov <sudakov@sibptus.tomsk.ru> writes: > On Mon, Apr 23, 2001 at 12:16:44PM +0200, Dag-Erling Smorgrav wrote: > > > As far as I understand, it can be exploited only after a user has > > > logged in, so ftpd is already chrooted > > Not necessarily. > Anonymous account is always chrooted. I think you have to play > with the source to disable this. The logged-in user is not necessarily anonymous. > > Run arbitrary code on the target machine, which may perform operations > > (such as creating new directories to store warez) which the FTP server > > normally doesn't allow the user to perform, > How is this possible if ftpd drops root privileges after > successful login? I didn't claim the code would run as root. It would run as the logged-in user, or user "ftp" in case of an anonymous login. > So, if the users already have shell accounts, this security hole > does not matter for me, does it? Probably not. Depends on your anonftp setup. DES -- Dag-Erling Smorgrav - des@ofug.org To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?xzpae57fyzl.fsf>