Information Security News mailing list archives
OpenBSD exploit gets serious
From: InfoSec News <isn () C4I ORG>
Date: Wed, 20 Dec 2000 23:09:37 -0600
http://www.theregister.co.uk/content/4/15614.html By: John Leyden Posted: 20/12/2000 at 15:19 GMT An esoteric buffer overflow bug in OpenBSD has been upgraded in importance after it was discovered that, in certain conditions, it could allow a cracker to gain remote access to a server. Users are recommended to apply a patch to fix the one-byte buffer overflow vulnerability present in an OpenBSD service called ftpd(8). The issue particularly affects non-anonymous FTP (File Transfer Protocol) servers, and administrators of these services are also been encouraged to use more secure transport mechanisms. For a system to be vulnerable, ftpd must have been enabled by the administrator because by default OpenBSD ships with the service turned off - though it is a frequently used service. The potential risk from the vulnerability is minimised by the fact that to exploit the problem a cracker must have access to at least one directory. These factors led to the importance of the bug to be downplayed at first. However the discovery, earlier this week, of a publicly available exploit of the vulnerability led OpenBSD developers to issue a fresh advisory on the issue. The vulnerability affects OpenBSD versions through 2.8 and NetBSD, though it is not believed to affect FreeBSD. OpenBSD administrators using ftpd are advised to disable the service and then apply the patch, available here, to their OpenBSD 2.8 source tree. [ OpenBSD patch at: http://www.openbsd.org/errata.html ] ISN is hosted by SecurityFocus.com --- To unsubscribe email LISTSERV () SecurityFocus com with a message body of "SIGNOFF ISN".
Current thread:
- OpenBSD exploit gets serious InfoSec News (Dec 21)