The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


[UNIX] FTP Kioslave Command Injection


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
Date: 5 Jan 2005 16:42:47 +0200
From: SecuriTeam <support@securiteam.com.>
To: [email protected]
Subject: [UNIX] FTP Kioslave Command Injection

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html 

- - - - - - - - -




  FTP Kioslave Command Injection
------------------------------------------------------------------------


SUMMARY

KDE applications which use the FTP kioslave, e.g. Konqueror, allow remote 
attackers to execute arbitrary FTP commands via an ftp:// URL that 
contains an URL-encoded newline ( %0a ) before the ftp command, which 
causes the commands to be inserted into the resulting FTP session.

Due to similarities between the FTP and the SMTP protocol, this 
vulnerability allows to misuse the FTP slave to connect to a SMTP server 
and issue arbitrary commands, like sending an email.

DETAILS

Vulnerable Systems:
 * All KDE releases up to including KDE 3.3.2

Proof of Concept:
A proof of concept exploit can be found in our previous article:  
<http://www.securiteam.com/securitynews/6E00R2KC0C.html>; Browsers' FTP 
Client can be Used to Send Mail.

Impact:
The FTP kioslave can be misused to execute any ftp command on the server 
or be a vector for sending out unsolicited email.

Solution:
Source code patches have been made available which fix these 
vulnerabilities. Contact your OS vendor / binary package provider for 
information about how to obtain updated binary packages.

Patch:
Patch for KDE 3.2.3 is available from  
<ftp://ftp.kde.org/pub/kde/security_patches>; 
ftp://ftp.kde.org/pub/kde/security_patches:
a639b7b592f005e911c454a0a8c9c542  post-3.2.3-kdelibs-kioslave.patch

Patch for KDE 3.3.2 is available from  
<ftp://ftp.kde.org/pub/kde/security_patches>; 
ftp://ftp.kde.org/pub/kde/security_patches:
fe67157b26a8cdf5bcfa1898cdf3b154  post-3.3.2-kdelibs-kioslave.patch

Time line and credits:
26/12/2004 Public bug report filed against kio_ftp by Thiago Macieira 
about being able to send email via kio_ftp CR/LF injection
26/12/2004 Patches developed by Thiago Macieira developed and applied to 
CVS
01/01/2005 Advisory released

CVE Information:
 <http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1165>; 
CAN-2004-1165


ADDITIONAL INFORMATION

The information has been provided by  <mailto:mueller@kde.org.> Dirk 
Mueller.
The original article can be found at:  
<http://www.kde.org/info/security/advisory-20050101-1.txt>; 
http://www.kde.org/info/security/advisory-20050101-1.txt




This bulletin is sent to members of the SecuriTeam mailing list. To unsubscribe from the list, send mail with an empty subject line and body to: [email protected] In order to subscribe to the mailing list, simply forward this email to: [email protected]

DISCLAIMER: The information in this bulletin is provided "AS IS" without warranty of any kind. In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.

<< Previous INDEX Search src Set bookmark Go to bookmark Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2025 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру