# # This script is copyright © 2001 by EMAZE Networks S.p.A. # under the General Public License (GPL). All Rights Reserved. # # changes by rd: added risk factor & fix bracket = raw_string(0x7B); if (description) { script_id(10821); script_cve_id("CAN-2001-0249", "CVE-2001-0550"); script_bugtraq_id(2550, 3581); script_version("$Revision$"); name["english"] = "FTPD glob Heap Corruption"; script_name(english: name["english"]); desc["english"] = " The FTPD glob vulnerability manifests itself in handling of the glob command. The problem is not a typical buffer overflow or format string vulnerability, but a combination of two bugs: an implementation of the glob command that does not properly return an error condition when interpreting the string ~" + bracket + ", and then frees memory which may contain user supplied data. This vulnerability is potentially exploitable by any user who is able to log in to a vulnerable server, including users with anonymous access. If successful, an attacker may be able to execute arbitrary code with the privileges of FTPD, typically root. Solution : Contact your vendor for a fix Risk factor : High"; script_description(english: desc["english"]); script_summary(english: "Check if the remote FTPD s vulnerable to a glob heap corruption vulnerability"); script_category(ACT_MIXED_ATTACK); script_family(english: "FTP"); script_copyright(english: "Copyright (C) 2001 E*Maze"); script_dependencie("find_service.nes", "ftp_anonymous.nasl", "nmap_osfingerprint.nes"); script_require_ports("Services/ftp", 21); exit(0); } # # Script code starts here # include("ftp_func.inc"); port = get_kb_item("Services/ftp"); if (!port) port = 21; if (!get_port_state(port)) exit(0); login = get_kb_item("ftp/login"); password = get_kb_item("ftp/password"); if(safe_checks())login = 0; if (login) { soc = open_sock_tcp(port); if (!soc) exit(0); if (ftp_log_in(socket:soc, user:login, pass:password)) { c = string("CWD ~", bracket, "\r\n"); d = string("CWD ~*", bracket, "\r\n"); send(socket:soc, data:c); b = ftp_recv_line(socket:soc); send(socket:soc, data:d); e = ftp_recv_line(socket:soc); # # Buggy version. no known exploits # buggy = string( "You seem to be running an FTP server which is vulnerable to the 'glob heap corruption'\n", "flaw, but which can not be exploited on this server.\n", "Solution: Upgrade your ftp server software to the latest version.\n", "Risk factor : Medium\n"); # # Vulnerable version. Working exploit has been written # vuln = string( "You seem to be running an FTP server which is vulnerable to the 'glob heap corruption'\n", "flaw, which is known to be exploitable remotely against this server. An attacker may use \n", "this flaw to execute arbitrary commands on this host.\n\n", "Solution: Upgrade your ftp server software to the latest version.\n", "Risk factor : High\n"); # # Check if the connetcion is lost # if it is, the daemon is vulnerable # linux/bsd: wuftpd, beroftpd # solaris ftpd # if ((!b) || (!e)) { security_hole(port:port, data:vuln); exit(0); } # # Freebsd / Openbsd command successfull. # buggy version # if ((b >< "250 CWD command successful") || (e >< "250 CWD command successful")) { security_hole(port:port, data:buggy); exit(0); } # # Netbsd vulnerable # if((b >< ":") || (e >< ":")) { security_hole(port:port, data:vuln); exit(0); } # # Aix buggy # if ((b >< "550 Unknown user name after ~") || (e >< "550 Unknown user name after ~")) { security_hole(port:port, data:buggy); exit(0); } # # MacOS X Darwin buggy # if ((b >< "550 ~: No such file or directory") || (e >< "550 ~: No such file or directory")) { security_hole(port:port, data:buggy); exit(0); } # # The non vulnerable version # ftp_close(socket:soc); exit(0); } ftp_close(socket: soc); } os = get_kb_item("Host/OS"); if(os) { if(egrep(pattern:".*FreeBSD (4\.[5-9]|5\..*).*", string:os))exit(0); } # # We weren't able to login into the ftp server. # check the banner instead # banner = get_ftp_banner(port: port); if (!banner) exit(0); # # FTP server 4.1 (aix/ultrix), 1.1. (hp-ux), 6.00 (darwin), 6.00LS (freebsd) # # wu-ftpd 2.6.1-20 is not vulnerable if(egrep(pattern:".*wu-2\.6\.1-[2-9][0-9].*", string:banner))exit(0); if ( egrep(pattern: ".*wu-([0-1]|(2\.([0-5][^0-9]|6\.[0-1]))).*", string:banner) || egrep(pattern: ".*BeroFTPD.*", string:banner) || egrep(pattern: ".*NetBSD-ftpd (199[0-9]|200[0-1]).*", string:banner) || egrep(pattern: ".*Digital UNIX Version [0-5]\..*", string:banner) || egrep(pattern: ".*SunOS [0-5]\.[0-8].*", string:banner) || egrep(pattern: ".*FTP server.*Version (1\.[0-1]\.|4\.1|6\.00|6\.00LS).*", string:banner) || egrep(pattern: ".*FTP server .SRPftp 1\.[0-3].*", string:banner)) { banvuln = string( "You seem to be running an FTP server which is vulnerable to the\n", "'glob heap corruption' flaw.\n", "An attacker may use this problem to execute arbitrary commands on this host.\n\n", "*** Nessus relied solely on the banner of the server to issue this warning,\n", "*** so this alert might be a false positive\n", "*** NOTE: must have a valid username/password to fully check this vulnerability\n\n", "Solution : Upgrade your ftp server software to the latest version.\n", "Risk factor : High\n"); security_hole(port:port, data:banvuln); exit(0); }