[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <223677037.20071130124843@SECURITY.NNOV.RU>
Date: Fri, 30 Nov 2007 12:48:43 +0300
From: 3APA3A <3APA3A@...URITY.NNOV.RU>
To: Valdis.Kletnieks@...edu
Cc: Rajesh Sethumadhavan <rajesh.sethumadhavan@...oo.com>,
bugtraq@...urityfocus.com
Subject: Re[2]: Microsoft FTP Client Multiple Bufferoverflow Vulnerability
Dear Valdis.Kletnieks@...edu,
--Friday, November 30, 2007, 1:19:49 AM, you wrote to 3APA3A@...URITY.NNOV.RU:
>> An attacker who can convince an user to extract a specially crafted
>> archive can overwrite arbitrary files with the permissions of the user
>> running gtar. If that user is root, the attacker can overwrite any
>> file on the system.
VKve> Apparently, somebody at FreeBSD thinks "can be exploited if you trick the
VKve> user into doing something" is a valid attack vector.
This is valid factor. The difference is, if you can force user to
extract archive, you need vulnerability in gtar in order to exploit. If
you can force user to run executable script, you need no vulnerability
in FTP client to exploit this.
--
~/ZARAZA http://securityvulns.com/
Неприятности начнутся в восемь. (Твен)
Powered by blists - more mailing lists