Multiple FTPD glob Command Arbitrary Command Execution

Copyright (C) 2001-2014 E*Maze


Synopsis :

The remote ftp server is affected by a remote code execution
vulnerability.

Description :

The FTPD glob vulnerability manifests itself in handling the glob
command. The problem is not a typical buffer overflow or format string
vulnerability, but a combination of two bugs - an implementation of
the glob command that does not properly return an error condition when
interpreting the string 'bracket', and then frees memory which may
contain user-supplied data.

An attacker who is able to log in to a vulnerable server, including
users with anonymous access, can exploit this to execute arbitrary
code with the privileges of the FTP service.

See also :

http://archives.neohapsis.com/archives/vulnwatch/2001-q3/0003.html
http://archives.neohapsis.com/archives/bugtraq/2001-11/0232.html
http://archives.neohapsis.com/archives/bugtraq/2001-11/0253.html

Solution :

Contact your vendor for a fix.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVSS Temporal Score : 6.2
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: FTP

Nessus Plugin ID: 10821 (ftpglob.nasl)

Bugtraq ID: 2550
3581

CVE ID: CVE-2001-0249
CVE-2001-0550