On Wed, Jul 13, 2005 at 11:50:15AM -0700, Cameron Eure wrote:
> Package: ftpd
> Status: install ok installed
> Maintainer: Alberto Gonzalez Iniesta <[EMAIL PROTECTED]>
> Architecture: i386
> Version: 0.17-21
> 
> I'm currently running Debian testing with a few packages from unstable.
> 
> I've discovered a vulnerability which would allow a remote denial of
> service attack in the ftpd program. It is caused by someone rapidly
> opening a socket, connecting server, then closeing the socket, and
> I've written a small example which can be examined below.
> 
> Here's a timeline of what an attack might look like:
> 
> * program rapidly opens a socket, connect()'s, then closes the socket
> * inetd redundantly reports: in.ftpd: connect from [host]
> * inetd, then, reports the message: ftp/tcp server failing (looping),
> service terminated

Right, that's not a bug. It's a feature. And it (as your logs say) is a
*inetd* feature, nothing to do with the ftpd server.
Take a look at the inetd docs and you'll see how to control that
feature.

Closing it.

Regards,

Alberto

-- 
Alberto Gonzalez Iniesta    | Formación, consultoría y soporte técnico
agi@(inittab.org|debian.org)| en GNU/Linux y software libre
Encrypted mail preferred    | http://inittab.com

Key fingerprint = 9782 04E7 2B75 405C F5E9  0C81 C514 AF8E 4BA4 01C3

Reply via email to