Subject: Re: [thomas@suse.de: SuSE Security Announcement: lukemftp, nkitb,
To: Jan Schaumann <jschauma@netbsd.org>
From: Brian A. Seklecki <lavalamp@spiritual-machines.org>
List: tech-security
Date: 05/16/2002 12:37:06
SuSE is only about....21 days late on this one....

I think I saw this fixed a long time ago:

Pullup to *1-5:

Module Name:    basesrc
Committed By:   he
Date:           Fri Apr 26 13:20:56 UTC 2002

Modified Files:
        basesrc/usr.bin/ftp [netbsd-1-5]: ftp.c

Log Message:
Pull up revision 1.118 (requested by itojun):
  Avoid buffer overrun on PASV response from a malicious server.


---------

Patch to current:

Module Name:    basesrc
Committed By:   itojun
Date:           Thu Apr 25 10:55:44 UTC 2002

Modified Files:
        basesrc/usr.bin/ftp: ftp.c

Log Message:
avoid buffer overrun on PASV from malicious server.
http://online.securityfocus.com/archive/1/269356/2002-04-22/2002-04-28/0

----------

-lava


On Thu, 16 May 2002 @ 12:23pm (-0400), Jan Schaumann wrote:

JS> All,
JS>
JS> Are we affected by the (snipped) security advisory below?  The posting
JS> to bugtraq did not contain a proof of concept or some such.
JS>
JS> -Jan
JS>
JS>
JS>
JS> ----- Forwarded message from Thomas Biege <thomas@suse.de> -----
JS>
JS> > Date: Thu, 16 May 2002 14:05:46 +0200 (CEST)
JS> > From: Thomas Biege <thomas@suse.de>
JS> > To: <bugtraq@securityfocus.com>
JS> > Subject: SuSE Security Announcement: lukemftp, nkitb, nkitserv (SuSE-SA:2002:018)
JS> >
JS> > -----BEGIN PGP SIGNED MESSAGE-----
JS> >
JS> > ______________________________________________________________________________
JS> >
JS> >                         SuSE Security Announcement
JS> >
JS> >         Package:                lukemftp, nkitb, nkitserv
JS> >         Announcement-ID:        SuSE-SA:2002:018
JS> >         Date:                   Wednesday, May 15th 2002 12:30 MEST
JS>
JS> >         Vulnerability Type:     remote command execution
JS> >         Severity (1-10):        3
JS> >         SuSE default package:   yes
JS> >         Other affected systems: all systems using lukemftp
JS>
JS> > ______________________________________________________________________________
JS> >
JS> > 1)  problem description, brief discussion, solution, upgrade information
JS> >
JS> >     Lukemftp (ftp(1), /usr/bin/ftp, /usr/bin/pftp) is a compfortable ftp
JS> >     client from NetBSD.
JS> >     A buffer overflow could be triggered by an malicious ftp server while the
JS> >     client parses the PASV ftp command. An attacker who control an ftp server
JS> >     to which a client using lukemftp is connected can gain remote access to
JS> >     the clients machine with the privileges of the user running lukeftp.
JS>
JS> > Bye,
JS> >      Thomas
JS> > --
JS> >   Thomas Biege <thomas@suse.de>
JS> >   SuSE Linux AG,Deutschherrnstr. 15-19,90429 Nuernberg
JS> >   Function: Security Support & Auditing
JS> >   "lynx -source http://www.suse.de/~thomas/contact/thomas.asc | pgp -fka"
JS> >   Key fingerprint = 51 AD B9 C7 34 FC F2 54  01 4A 1C D4 66 64 09 83
JS> > --
JS> > 	Trete durch die Form ein, und trete aus der Form  heraus.
JS>
JS> ----- End forwarded message -----
JS>

later -           | _BonaFide[] = { coder, author, | /~\ The ASCII Ribbon
Brian A. Seklecki | problem solver, scholar, BOFH, | \ / Campaign Against
                  | vegetarian, runner, NetBSD     |  X  Exchange, Outlook
                  | advocate, spiritual machine }; | / \ & HTML Email

"GNU/Linux: About as stable as the elements at the bottom of the periodic table"