COMMAND

    wuftpd

SYSTEMS AFFECTED

    wu-ftpd 2.6.0-*

PROBLEM

    George Bakos posted following.  www.hack.co.za made available  yet
    another format string stack overwrite exploit for wu-ftpd 2.6.0-*.
    He has seen an increased level  of scanning for port 21 since,  no
    doubt attributable to this latest SITE EXEC vulnerability.

    The new tool (wu-lnx.c) in the lab against Mandrake 7.1 and RH 6.0
    shows limited success as well as 100% effectiveness against RH 6.2.
    A preliminary  scrub of  the code  and traces  indicated that user
    data supplied via the PASS  command is stuffed with shellcode  and
    a SITE EXEC then overwrites a stack pointer to call it.

    The following is an entry left in /var/log/messages on the  target
    box.  Note the last line.

        Sep 28 02:46:25 drteeth ftpd[14989]: ANONYMOUS FTP LOGIN FROM
        grover.tester.org [192.168.222.1], 
        ?
        
        
        1À1Û1É°FÍ€1À1ÛC‰ÙA°?
        Í€ëk^1À1É^^AˆF^Df¹ÿ^A°'Í€1À^^A°=Í€1À1Û^^H‰C^B1ÉþÉ1À^^
        H°^LÍ€þÉuó1ÀˆF^I^^H°=Í€þ^N°0þȈF^D1ÀˆF^G‰v^H‰F^L‰óN^H
        V^L°^KÍ€1À1Û°^AÍ€èÿÿÿ0bin0sh1..11

    As the  parent service  (inetd) is  not affected,  here may  be no
    external indication that a site has been attacked.   Additionally,
    this  is  not  a  buffer  overflow,  and  no  process  will   exit
    unexpectedly.  Ndiff  and similar techniques  will fail to  detect
    any changes  in the  status of  listening inet  ports on exploited
    systems.

SOLUTION

    Version  2.6.1  does  not  appear  vulnerable.   This  is  another
    incarnation of a very serious  vulnerability.  If you are  running
    wu-ftpd  2.60-*,  it  is  advised  that  you  upgrade to the 2.6.1
    release.