oss-sec mailing list archives

Re: CVE id request: ftpd


From: "Steven M. Christey" <coley () linus mitre org>
Date: Tue, 30 Sep 2008 14:28:02 -0400 (EDT)


CVE-2008-4247 is for *BSD's ftpd; CVE-2008-4242 is for ProFTPD.

- Steve


======================================================
Name: CVE-2008-4242
Status: Candidate
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4242
Reference: CONFIRM:http://bugs.proftpd.org/show_bug.cgi?id=3115
Reference: BID:31289
Reference: URL:http://www.securityfocus.com/bid/31289
Reference: SECUNIA:31930
Reference: URL:http://secunia.com/advisories/31930
Reference: XF:proftpd-url-csrf(45274)
Reference: URL:http://xforce.iss.net/xforce/xfdb/45274

ProFTPD 1.3.1 interprets long commands from an FTP client as multiple
commands, which allows remote attackers to conduct cross-site request
forgery (CSRF) attacks and execute arbitrary FTP commands via a long
ftp:// URI that leverages an existing session from the FTP client
implementation in a web browser.


======================================================
Name: CVE-2008-4247
Status: Candidate
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4247
Reference: MISC:http://bugs.proftpd.org/show_bug.cgi?id=3115
Reference: CONFIRM:http://www.openbsd.org/cgi-bin/cvsweb/src/libexec/ftpd/ftpcmd.y
Reference: CONFIRM:http://www.openbsd.org/cgi-bin/cvsweb/src/libexec/ftpd/ftpcmd.y.diff?r1=1.51&r2=1.52&f=h
Reference: CONFIRM:http://www.openbsd.org/cgi-bin/cvsweb/src/libexec/ftpd/ftpd.c
Reference: CONFIRM:http://www.openbsd.org/cgi-bin/cvsweb/src/libexec/ftpd/ftpd.c.diff?r1=1.183&r2=1.184&f=h
Reference: SECTRACK:1020946
Reference: URL:http://www.securitytracker.com/id?1020946

ftpd in OpenBSD 4.3, FreeBSD 7.0, and NetBSD 4.0 interprets long
commands from an FTP client as multiple commands, which allows remote
attackers to conduct cross-site request forgery (CSRF) attacks and
execute arbitrary FTP commands via a long ftp:// URI that leverages an
existing session from the FTP client implementation in a web browser.



Current thread: