On Thu, Jun 19, 2003 at 09:34:09AM -0400, Rickard, Matthew wrote:
> I'm scanning a Solaris 9 machine running wu-ftpd 2.6.2 (which Sun has
> rebundled and called SunFTPd 10).  On scanning this machine (safe checks
> disabled, nessus 2.0.6a), I'm getting what seem to be false positives for
> vulnerabilities.  Nessus is reporting vulnerabilities related to AIX FTPd
> and SunFTP 9.  I haven't been able to find any reference of wu-ftpd 2.6.2
> being vulnerable to these exploits.  If this report is inaccurate, why is
> Nessus reporting this?  If not, where can I find documentation of these
> vulnerabilities?  The ftp vulnerabilities are listed below in entirety.
> 
> It was possible to make the remote FTP server
> crash by issuing this command :
> 
> CEL aaaa[...]aaaa

It means that the remote host abruptly closed the communication when
it received the command above. Either this is because there is a buffer
overflow condition, or because there is some code in it like :

        if ( strlen(request)  > 255 )
                exit(1); /* User is Naughty */


Nessus can not make the distinction remotely, therefore you'll have to
see for yourself (ie: is there a core file somewhere ?)

> Vulnerability found on port ftp (21/tcp)
> 
> Buffer overflow in SunFTP build 9(1) allows remote attackers to cause
> a denial of service or possibly execute arbitrary commands by sending
> more than 2100 characters to the server.
> 
> Solution : Switching to another FTP server, SunFTP is discontinued.


Same thing as above. The advice is true though - if SunFTP has been
discontinued, maybe you don't want to run this software on a production
host.


> Vulnerability found on port ftp (21/tcp)
> 
> The remote FTP server closes
> the connection when one of the commands is given
> a too long argument. 

Same thing again.



                                -- Renaud

Reply via email to