- Community Home
- >
- Servers and Operating Systems
- >
- Operating Systems
- >
- Operating System - HP-UX
- >
- Security Vulnerability in ftpd
Operating System - HP-UX
1820256
Members
3055
Online
109622
Solutions
Forums
Categories
Company
Local Language
юдл
back
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Discussions
Discussions
Discussions
Forums
Forums
Discussions
юдл
back
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Blogs
Information
Community
Resources
Community Language
Language
Forums
Blogs
Topic Options
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО07-12-2000 07:28 AM
тАО07-12-2000 07:28 AM
Security Vulnerability in ftpd
A. Background
There are 2 problems with FTP Server (ftpd) on HP-UX.
1. ftpd handling of the SITE EXEC command that allows remote
users to gain root access. This is possible in the default
configuration of ftpd on HP-UX 11.00 ONLY.
2. ftpd does not properly format the parameters to the
setproctitle() function, allowing users to gain root access.
This problem applies to both 11.00 and 10.X.
B. Fixing the problem
All system administrators are encouraged to install our temporary
binary until an official patch is released. The file can be retrieved
to simply replace the original factory supplied binary.
C. Recommended solution
Two temporary ftp binaries (for HP-UX 11.00 and HP-UX 10.20)
can be found at:
ftp://ftp.cup.hp.com/dist/networking/ftp/ftpd.11.0
ftp://ftp.cup.hp.com/dist/networking/ftp/ftpd.10.20
These are to be installed in /usr/lbin/ftpd with permissions 544.
NOTE: This advisory will be updated when patches become available.
Berlene.
D. To subscribe to automatically receive future NEW HP Security
Bulletins/Advisories from the HP IT Resource Center via
electronic mail, do the following:
Use your browser to get to the HP IT Resource Center page
at:
http://itrc.hp.com
Under the Maintenance and Support Menu (Electronic Support Center):
click on the "more..." link. Then -
Use the 'Login' tab at the left side of the screen to login
using your ID and password. Check with your system
administrator to see if you have an existing login or use
the "Register" button at the left to create a login. You
will need to login in order to gain access to many areas of
the ITRC. Remember to save the User ID assigned to you, and
your password.
Under the Maintenance and Support Menu, click on the "more..."
link. Under the "Notifications" section (near the bottom of
the page), select "Support Information Digests".
To -subscribe- to future HP Security Bulletins or other
Technical Digests, click the check box (in the left column)
for the appropriate digest and then click the "Update
Subscriptions" button at the bottom of the page.
or
To -review- bulletins already released, select the link
(in the middle column) for the appropriate digest.
To -gain access- to the Security Patch Matrix, select
the link for "The Security Bulletins Archive". Once in
the archive the third link is to our current Security
Patch Matrix. Updated daily, this matrix categorizes security
patches by platform/OS release, and by bulletin topic.
The security patch matrix is also available via anonymous ftp:
us-ffs.external.hp.com
~ftp/export/patches/hp-ux_patch_matrix"
On the "Support Information Digest Main" page:
click on the "HP Security Bulletin Archive".
E. To report new security vulnerabilities, send email to
security-alert@hp.com
Please encrypt any exploit information using the security-alert
PGP key, available from your local key server, or by sending a
message with a -subject- (not body) of 'get key' (no quotes) to
security-alert@hp.com.
Permission is granted for copying and circulating this Advisory to
Hewlett-Packard (HP) customers (or the Internet community) for the
purpose of alerting them to problems, if and only if, the Advisory
is not edited or changed in any way, is attributed to HP, and provided such reproduction and/or distribution is performed for non-commercial purposes.
Any other use of this information is prohibited. HP is not liable for any misuse of this information by any third party.
There are 2 problems with FTP Server (ftpd) on HP-UX.
1. ftpd handling of the SITE EXEC command that allows remote
users to gain root access. This is possible in the default
configuration of ftpd on HP-UX 11.00 ONLY.
2. ftpd does not properly format the parameters to the
setproctitle() function, allowing users to gain root access.
This problem applies to both 11.00 and 10.X.
B. Fixing the problem
All system administrators are encouraged to install our temporary
binary until an official patch is released. The file can be retrieved
to simply replace the original factory supplied binary.
C. Recommended solution
Two temporary ftp binaries (for HP-UX 11.00 and HP-UX 10.20)
can be found at:
ftp://ftp.cup.hp.com/dist/networking/ftp/ftpd.11.0
ftp://ftp.cup.hp.com/dist/networking/ftp/ftpd.10.20
These are to be installed in /usr/lbin/ftpd with permissions 544.
NOTE: This advisory will be updated when patches become available.
Berlene.
D. To subscribe to automatically receive future NEW HP Security
Bulletins/Advisories from the HP IT Resource Center via
electronic mail, do the following:
Use your browser to get to the HP IT Resource Center page
at:
http://itrc.hp.com
Under the Maintenance and Support Menu (Electronic Support Center):
click on the "more..." link. Then -
Use the 'Login' tab at the left side of the screen to login
using your ID and password. Check with your system
administrator to see if you have an existing login or use
the "Register" button at the left to create a login. You
will need to login in order to gain access to many areas of
the ITRC. Remember to save the User ID assigned to you, and
your password.
Under the Maintenance and Support Menu, click on the "more..."
link. Under the "Notifications" section (near the bottom of
the page), select "Support Information Digests".
To -subscribe- to future HP Security Bulletins or other
Technical Digests, click the check box (in the left column)
for the appropriate digest and then click the "Update
Subscriptions" button at the bottom of the page.
or
To -review- bulletins already released, select the link
(in the middle column) for the appropriate digest.
To -gain access- to the Security Patch Matrix, select
the link for "The Security Bulletins Archive". Once in
the archive the third link is to our current Security
Patch Matrix. Updated daily, this matrix categorizes security
patches by platform/OS release, and by bulletin topic.
The security patch matrix is also available via anonymous ftp:
us-ffs.external.hp.com
~ftp/export/patches/hp-ux_patch_matrix"
On the "Support Information Digest Main" page:
click on the "HP Security Bulletin Archive".
E. To report new security vulnerabilities, send email to
security-alert@hp.com
Please encrypt any exploit information using the security-alert
PGP key, available from your local key server, or by sending a
message with a -subject- (not body) of 'get key' (no quotes) to
security-alert@hp.com.
Permission is granted for copying and circulating this Advisory to
Hewlett-Packard (HP) customers (or the Internet community) for the
purpose of alerting them to problems, if and only if, the Advisory
is not edited or changed in any way, is attributed to HP, and provided such reproduction and/or distribution is performed for non-commercial purposes.
Any other use of this information is prohibited. HP is not liable for any misuse of this information by any third party.
http://www.mindspring.com/~bkherren/dobes/index.htm
2 REPLIES 2
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО07-12-2000 07:34 AM
тАО07-12-2000 07:34 AM
Re: Security Vulnerability in ftpd
1. Ftp the new binary over
2. Owner and Group should be "bin"
3. Mode or permission are 544
4. file should be rename to be "ftpd"
5. copy binary to /usr/lbin
Berlene
2. Owner and Group should be "bin"
3. Mode or permission are 544
4. file should be rename to be "ftpd"
5. copy binary to /usr/lbin
Berlene
http://www.mindspring.com/~bkherren/dobes/index.htm
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО07-12-2000 08:06 AM
тАО07-12-2000 08:06 AM
Re: Security Vulnerability in ftpd
Binaries attached
http://www.mindspring.com/~bkherren/dobes/index.htm
The opinions expressed above are the personal opinions of the authors, not of Hewlett Packard Enterprise. By using this site, you accept the Terms of Use and Rules of Participation.
Company
Learn About
News and Events
Support
© Copyright 2025 Hewlett Packard Enterprise Development LP