Multiple Vendor ftpd setproctitle() Format String Vulnerability

BID:1425

Info

Multiple Vendor ftpd setproctitle() Format String Vulnerability

Bugtraq ID: 1425
Class: Input Validation Error
CVE: CVE-2000-0574
Remote: Yes
Local: No
Published: Jul 05 2000 12:00AM
Updated: Jul 11 2009 02:56AM
Credit: This vulnerability was posted to the Bugtraq mailing list on July 5, 2000 by lamagra < [email protected]>
Vulnerable: SuSE Linux 6.4 ppc
SuSE Linux 6.4 alpha
SuSE Linux 6.4
SuSE Linux 6.3 ppc
SuSE Linux 6.3 alpha
SuSE Linux 6.3
SuSE Linux 6.2
SuSE Linux 6.1
SuSE Linux 6.0
ProFTPD Project ProFTPD 1.2 pre9
ProFTPD Project ProFTPD 1.2 pre8
ProFTPD Project ProFTPD 1.2 pre7
ProFTPD Project ProFTPD 1.2 pre6
ProFTPD Project ProFTPD 1.2 pre5
ProFTPD Project ProFTPD 1.2 pre4
ProFTPD Project ProFTPD 1.2 pre3
ProFTPD Project ProFTPD 1.2 pre2
ProFTPD Project ProFTPD 1.2 pre10
ProFTPD Project ProFTPD 1.2 pre1
opieftpd ftp 1.3
OpenBSD OpenBSD 2.7
OpenBSD OpenBSD 2.6
OpenBSD OpenBSD 2.5
OpenBSD OpenBSD 2.4
OpenBSD OpenBSD 2.3
OpenBSD OpenBSD 2.2
OpenBSD OpenBSD 2.1
OpenBSD OpenBSD 2.0
NetBSD NetBSD 1.4.2 x86
NetBSD NetBSD 1.4.2 SPARC
NetBSD NetBSD 1.4.2 arm32
NetBSD NetBSD 1.4.2 Alpha
NetBSD NetBSD 1.4.1 x86
NetBSD NetBSD 1.4.1 SPARC
NetBSD NetBSD 1.4.1 arm32
NetBSD NetBSD 1.4.1 Alpha
NetBSD NetBSD 1.4 x86
NetBSD NetBSD 1.4 SPARC
NetBSD NetBSD 1.4 arm32
NetBSD NetBSD 1.4 Alpha
NetBSD NetBSD 1.3.3
NetBSD NetBSD 1.3.2
NetBSD NetBSD 1.3.1
NetBSD NetBSD 1.3
NetBSD NetBSD 1.2.1
NetBSD NetBSD 1.2
NetBSD NetBSD 1.1
NetBSD NetBSD 1.0
Linux ftpd 0.16
HP HP-UX 11.0
HP HP-UX 10.20
HP HP-UX 10.10
FreeBSD FreeBSD 2.1.7 .1
FreeBSD FreeBSD 2.1.6 .1
FreeBSD FreeBSD 2.1.6
FreeBSD FreeBSD 2.1.5
FreeBSD FreeBSD 2.1
FreeBSD FreeBSD 2.0.5
FreeBSD FreeBSD 2.0
FreeBSD FreeBSD 1.1.5 .1
Debian Linux 2.2
Debian Linux 2.1
Not Vulnerable: SGI IRIX 6.5.8
SGI IRIX 6.5
SGI IRIX 6.4
SGI IRIX 6.3
SGI IRIX 6.2
SGI IRIX 6.1
SGI IRIX 6.0
SGI IRIX 5.3
SGI IRIX 5.2
SGI IRIX 5.1
SGI IRIX 5.0
SGI IRIX 4.0
SGI IRIX 3.3
SGI IRIX 3.2
ProFTPD Project ProFTPD 1.2
+ Cobalt Qube 3.0
+ Cobalt Qube 2.0
+ Cobalt RaQ 3.0
+ Cobalt RaQ 2.0
+ Cobalt RaQ 1.1
Linux ndis-wrapper 1.28 RC2
FreeBSD FreeBSD 5.0 alpha
FreeBSD FreeBSD 5.0
FreeBSD FreeBSD 4.0 alpha
FreeBSD FreeBSD 4.0
FreeBSD FreeBSD 3.5
FreeBSD FreeBSD 3.4
FreeBSD FreeBSD 3.3
FreeBSD FreeBSD 3.2
FreeBSD FreeBSD 3.1
FreeBSD FreeBSD 3.0
FreeBSD FreeBSD 2.2.8
FreeBSD FreeBSD 2.2.6
FreeBSD FreeBSD 2.2.5
FreeBSD FreeBSD 2.2.4
FreeBSD FreeBSD 2.2.3
FreeBSD FreeBSD 2.2.2
FreeBSD FreeBSD 2.2

Discussion

Multiple Vendor ftpd setproctitle() Format String Vulnerability

A number of ftp daemons, including versions of wu-ftpd, OpenBSD ftpd (ports of this package are distributed with some Linux distributions), HP-UX ftpd, and proftpd, have a vulnerability caused by the passing of user input to the set_proc_title() function. This function in turn calls setproctitle() after using this user data to generate a buffer to pass to setproctitle. setproctitle is defined as setproctitle(char *fmt, ...). The buffer created is passed as the format argument to setproctitle. setproctitle will make a call to the vsnprintf() call, taking the buffer passed as the format string. By carefully manipulating the contents of this buffer, a remote user can cause values on the stack to be overwritten, and potentially cause arbitrary code to be executed as root.

Solution / Fix

Multiple Vendor ftpd setproctitle() Format String Vulnerability

Solution:

OpenBSD ftpd:
A patch is available at http://www.openbsd.org/errata.html#ftpd

ProFTPD:
Upgrade to ProFTPD 1.2.0 when it is available.

Manual patch:
Replace the call to setproctitle() in the set_proc_title() with a properly used format string.
Replace:
setproctitle(statbuf);
with
setproctitle("%s", statbuf);

wu-ftpd - upgrade to version 2.6.1:
ftp://ftp.wu-ftpd.org/pub/wu-ftpd/wu-ftpd-2.6.1.tar.gz
ftp://ftp.wu-ftpd.org/pub/wu-ftpd/wu-ftpd-2.6.1.tar.gz.asc
ftp://ftp.wu-ftpd.org/pub/wu-ftpd/wu-ftpd-2.6.1.tar.Z
ftp://ftp.wu-ftpd.org/pub/wu-ftpd/wu-ftpd-2.6.1.tar.Z.asc

SuSE Linux - updates are available.
http://suse.de/de/support/security/suse_security_announce_571.txt

Debian:
This problem has been corrected in netstd 3.07-7slink.4 for Debian 2.1 (slink) and in ftpd 0.11-8potato.1 for Debian 2.2 (potato). We recommend upgrading your ftpd immediately.

Fixed in: Debian 2.1 (slink):
Source:
http://security.debian.org/dists/slink/updates/source/netstd_3.07-7slink.4.diff.gz
http://security.debian.org/dists/slink/updates/source/netstd_3.07-7slink.4.dsc
http://security.debian.org/dists/slink/updates/source/netstd_3.07.orig.tar.gz
alpha:
http://security.debian.org/dists/slink/updates/binary-alpha/netstd_3.07-7slink.4_alpha.deb
i386:
http://security.debian.org/dists/slink/updates/binary-i386/netstd_3.07-7slink.4_i386.deb
m68k:
http://security.debian.org/dists/slink/updates/binary-m68k/netstd_3.07-7slink.4_m68k.deb
sparc:
http://security.debian.org/dists/slink/updates/binary-sparc/netstd_3.07-7slink.4_sparc.deb
Debian 2.2 (potato):
Source:
http://security.debian.org/dists/potato/updates/main/source/linux-ftpd_0.11-8potato.1.diff.gz
http://security.debian.org/dists/potato/updates/main/source/linux-ftpd_0.11-8potato.1.dsc
http://security.debian.org/dists/potato/updates/main/source/linux-ftpd_0.11.orig.tar.gz
arm:
http://security.debian.org/dists/potato/updates/main/binary-arm/ftpd_0.11-8potato.1_arm.deb
i386:
http://security.debian.org/dists/potato/updates/main/binary-i386/ftpd_0.11-8potato.1_i386.deb
sparc:
http://security.debian.org/dists/potato/updates/main/binary-sparc/ftpd_0.11-8potato.1_sparc.deb


ProFTPD Project ProFTPD 1.2 pre4

ProFTPD Project ProFTPD 1.2 pre5

ProFTPD Project ProFTPD 1.2 pre8

ProFTPD Project ProFTPD 1.2 pre6

ProFTPD Project ProFTPD 1.2 pre1

ProFTPD Project ProFTPD 1.2 pre9

ProFTPD Project ProFTPD 1.2 pre7

ProFTPD Project ProFTPD 1.2 pre3

ProFTPD Project ProFTPD 1.2 pre2

ProFTPD Project ProFTPD 1.2 pre10

opieftpd ftp 1.3

HP HP-UX 10.10

HP HP-UX 10.20

HP HP-UX 11.0
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

Free CVE JSON API cve.report/api

CVE.report and Source URL Uptime Status status.cve.report