Skip site navigation (1)Skip section navigation (2)
Date:      23 Apr 2001 16:54:22 +0200
From:      Dag-Erling Smorgrav <des@ofug.org>
To:        Victor Sudakov <sudakov@sibptus.tomsk.ru>
Cc:        freebsd-security@freebsd.org
Subject:   Re: Q: Impact of globbing vulnerability in ftpd
Message-ID:  <xzpae57fyzl.fsf@flood.ping.uio.no>
In-Reply-To: <20010423190737.A25969@sibptus.tomsk.ru>
References:  <20010423111632.B17342@sibptus.tomsk.ru> <xzpitjvgbub.fsf@flood.ping.uio.no> <20010423190737.A25969@sibptus.tomsk.ru>

next in thread | previous in thread | raw e-mail | index | archive | help
Victor Sudakov <sudakov@sibptus.tomsk.ru> writes:
> On Mon, Apr 23, 2001 at 12:16:44PM +0200, Dag-Erling Smorgrav wrote:
> > > As far as I understand, it can be exploited only after a user has
> > > logged in, so ftpd is already chrooted
> > Not necessarily.
> Anonymous account is always chrooted. I think you have to play
> with the source to disable this.

The logged-in user is not necessarily anonymous.

> > Run arbitrary code on the target machine, which may perform operations
> > (such as creating new directories to store warez) which the FTP server
> > normally doesn't allow the user to perform, 
> How is this possible if ftpd drops root privileges after
> successful login?

I didn't claim the code would run as root.  It would run as the
logged-in user, or user "ftp" in case of an anonymous login.

> So, if the users already have shell accounts, this security hole
> does not matter for me, does it?

Probably not.  Depends on your anonftp setup.

DES
-- 
Dag-Erling Smorgrav - des@ofug.org

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?xzpae57fyzl.fsf>