The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


[UNIX] Hewlett Packard HP-UX ftpd Remote Buffer Overflow


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
Date: 22 Dec 2004 11:15:03 +0200
From: SecuriTeam <support@securiteam.com.>
To: [email protected]
Subject: [UNIX] Hewlett Packard HP-UX ftpd Remote Buffer Overflow

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html 

- - - - - - - - -




  Hewlett Packard HP-UX ftpd Remote Buffer Overflow
------------------------------------------------------------------------


SUMMARY

HP-UX FTP Daemon is a service included in HP-UX that implements the File 
Transfer Protocol. Remote exploitation of a buffer overflow vulnerability 
in the file transfer protocol (FTP) daemon included in multiple versions 
of Hewlett Packard Development Co.'s (HP) HP-UX allows attackers to gain 
remote root access in certain configurations.

DETAILS

Vulnerable Systems:
 * HP-UX version 11.11i

The problem specifically exists when the FTP daemon is configured via 
/etc/inetd.conf to log debug information using -v switch. This is a not a 
default configuration option. When parsing a long command request, an 
exploitable stack overflow will occur. The overflow occurs before 
authentication, thus eliminating the need for a local or anonymous FTP 
account.

Analysis:
Exploitation of this vulnerability allows unauthenticated remote attackers 
to execute arbitrary code under the privileges of the FTP daemon server, 
usually root. The severity of this issue is mitigated by the fact that in 
most production environments, administrators will not be using the 
debug-logging feature of FTP daemon.

Detection:
To determine if a specific configuration is vulnerable, check 
/etc/inetd.conf for the ftpd line and see if the debug switch is enabled:
grep 'ftpd' /etc/inetd.conf | grep -- -v 

If the above command returns text, then the FTP daemon is running in debug 
mode.

Workaround:
Do not use the -v flag in the FTP daemon entry line in /etc/inetd.conf. If 
debug-logging is necessary, consider allowing only trusted hosts access to 
the service using firewall rules or TCP wrappers.

Vendor response:
This vulnerability was addressed in the following patches:
 * HP-UX B.11.00: PHNE_29460
 * HP-UX B.11.04: PHNE_31034
 * HP-UX B.11.11: PHNE_29461
 * HP-UX B.11.22: PHNE_29462

Disclosure timeline:
12/02/2004 - Initial vendor notification
12/03/2004 - Initial vendor response
12/21/2004 - Public disclosure


ADDITIONAL INFORMATION

The information has been provided by  
<mailto:customerservice@idefense.com.> iDEFENSE.
The original article can be found at:  
<http://www.idefense.com/application/poi/display?id=175&type=vulnerabilities>; http://www.idefense.com/application/poi/display?id=175&type=vulnerabilities




This bulletin is sent to members of the SecuriTeam mailing list. To unsubscribe from the list, send mail with an empty subject line and body to: [email protected] In order to subscribe to the mailing list, simply forward this email to: [email protected]

DISCLAIMER: The information in this bulletin is provided "AS IS" without warranty of any kind. In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.

<< Previous INDEX Search src Set bookmark Go to bookmark Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2025 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру