Date: Fri, 30 Nov 2007 12:48:43 +0300
From: 3APA3A <3APA3A@SECURITY.NNOV.RU.>
To: [email protected]Subject: Re[2]: Microsoft FTP Client Multiple Bufferoverflow Vulnerability
In-Reply-To: <7366.1196374789@turing-police.cc.vt.edu.>
References: <261966.44430.qm@web30413.mail.mud.yahoo.com.>
<1066197146.20071129144606@SECURITY.NNOV.RU.>
<7366.1196374789@turing-police.cc.vt.edu.>
MIME-Version: 1.0
Content-Type: text/plain; charset=Windows-1251
Content-Transfer-Encoding: quoted-printable
X-Virus-Scanned: antivirus-gw at tyumen.ru
Dear [email protected],
--Friday, November 30, 2007, 1:19:49 AM, you wrote to [email protected]=
V.RU:
>> An attacker who can convince an user to extract a specially crafted
>> archive can overwrite arbitrary files with the permissions of the user
>> running gtar. If that user is root, the attacker can overwrite any
>> file on the system.
VKve> Apparently, somebody at FreeBSD thinks "can be exploited if you tri=
ck the
VKve> user into doing something" is a valid attack vector.
This is valid factor. The difference is, if you can force user to
extract archive, you need vulnerability in gtar in order to exploit. If
you can force user to run executable script, you need no vulnerability
in FTP client to exploit this.
--=20
~/ZARAZA http://securityvulns.com/
=CD=E5=EF=F0=E8=FF=F2=ED=EE=F1=F2=E8 =ED=E0=F7=ED=F3=F2=F1=FF =E2 =E2=EE=F1=
=E5=EC=FC. (=D2=E2=E5=ED)