From owner-freebsd-security Tue Apr 10 16: 2:45 2001 Delivered-To: freebsd-security@freebsd.org Received: from smtp-server2.tampabay.rr.com (smtp-server2.tampabay.rr.com [65.32.1.39]) by hub.freebsd.org (Postfix) with ESMTP id 2AFA037B422 for ; Tue, 10 Apr 2001 16:02:43 -0700 (PDT) (envelope-from habeeb@cfl.rr.com) Received: from descrypt.com (IDENT:root@ubr-33.101.76.melbourne.cfl.rr.com [65.33.101.76]) by smtp-server2.tampabay.rr.com (8.11.2/8.11.2) with SMTP id f3AMeWC12123 for ; Tue, 10 Apr 2001 18:40:32 -0400 (EDT) From: David Organization: Serpant Technologies To: freebsd-security@freebsd.org Subject: FTPD vulnerability question Date: Tue, 10 Apr 2001 17:53:05 -0500 X-Mailer: KMail [version 1.1.99] Content-Type: text/plain; charset="iso-8859-1" MIME-Version: 1.0 Message-Id: <01041017530502.11342@descrypt.com> Content-Transfer-Encoding: 8bit Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org I just read the CERT advisory, and noticed it mentioned FreeBSD FTPD vulnerable. I took a quick check at the source code for the stock FTPD on my system, and did not notice any possible overflows for glob().. atleast none that jumped out at me (yet?). FreeBSD 4.2-STABLE #0: Sun Jan 21 11:43:43 EST 2001 root@fortress:/usr/obj/usr/src/sys/FORTRESS # telnet 0 21 Trying 0.0.0.0... Connected to 0. Escape character is '^]'. 220 [server name] FTP server (Version 6.00LS) ready. I am just making sure that the CERT advisory meant ALL 4.2 -stable versions (I am a bit paranoid right now :). If it does that's great. To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message