Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

FTP:EXPLOIT:GLFTPD-KAKAKA

Severity

High

Recommended

No

Recommended Action

Drop

Category

FTP

Keywords

ftp ftpd glftp glftpd kakaka path traversal

Release Date

2003/04/22

Update Number

1213

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

FTP: GLftpd Administrator Account Compromise


This signature detects attempts to exploit a known vulnerability against GLftpd. Attackers can use a maliciously crafted FTP session to execute arbitrary commands on the host as the administrative user.

Extended Description

A vulnerabilty has been discovered in Archimede's glftpd which may allow an unauthorized user to obtain root privileges. When adding a 'oneliner' string on the FTP server, root privileges are required to update the global FTP file 'oneliners'. It has been reported that glftpd fails to effectively drop privileges after updating the said file. Exploitation of this issue may allow an attacker to obtain an effective user identification of 'root'. It should be noted that the user would still be contained within the established FTP chroot environment.

Affected Products

  • Archimede's Glftpd Glftpd 1.25.0
  • Archimede's Glftpd Glftpd 1.26.0
  • Archimede's Glftpd Glftpd 1.27.0
  • Archimede's Glftpd Glftpd 1.28.0

References

  • BugTraq: 6910
  • URL: http://www.securityfocus.com/archive/1/312927
  • URL: http://safety-lab.com/audits/showauditinfo.pl?lang=en&num=828

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out