Package: proftpd-basic
Version: 1.3.3a-5

Hi, 

My server just got rooted and what I've done for now, to dig into what
could have
been the leak, points to proftpd, mod_facl in particular.
I won't have a way to dig further until this evening (UTC+1 local time),
but it is a testing(squeeze) debian almost up to date with only ssh,
apache and
proftpd available from the outside. 

Here is the logcheck notification that lead me to think mod_facl is
guilty: 

Nov 14 05:55:50 carmgate useradd[27810]: new group: name=psadmin, GID=1002
Nov 14 05:55:50 carmgate useradd[27810]: new user: name=psadmin, UID=1002,
GID=1002, home=/home/psadmin, shell=/bin/sh
Nov 14 05:55:50 carmgate proftpd[9638]: error: duplicate fs paths not
allowed: '/'
Nov 14 05:55:50 carmgate proftpd[9638]: mod_facl/0.4: error registering
'facl' FS: Operation not permitted
Nov 14 05:55:50 carmgate proftpd[9638]: mod_dso/0.5: module 'mod_facl.c'
failed to initialize
Nov 14 05:55:50 carmgate proftpd[9638]: Fatal: LoadModule: error loading
module 'mod_facl.c': Operation not permitted on line 86 of
'/etc/proftpd/modules.conf'

After this, I ve had a tiger notification that might show other
vulnerability (but on those one, I could be the guilty one):

# Performing check of user accounts...
NEW: --WARN-- [acc006w] Login ID userx's home directory (/tmp) has world
write access.
# Performing check of passwd files...
NEW: --WARN-- [pass002w] UID 0 exists multiple times (2) in /etc/passwd.
NEW: --WARN-- [pass002w] UID 9 exists multiple times (2) in /etc/passwd.
NEW: --WARN-- [pass017w] Login ID default has uid == 0.
# Checking the format of passwd and group files.
NEW: --FAIL-- [pass009f] Login default has a group id of 1 which should be
reserved for bin or daemon.
NEW: --FAIL-- [pass009f] Login default has a user id of 0 which should be
reserved for root
NEW: --FAIL-- [pass009f] Login default has an unusual password content.
NEW: --FAIL-- [pass009f] Login userx has an unusual password content.
NEW: --WARN-- [pass002w] File /etc/passwd has duplicate user ids:
NEW: default 0 root 0 news 9 userx 9

I dont know if the vulnerability in proftpd is a new one but I found no
trace of such a thing by googling or browsing proftpd or debian bug
trackers, so I assume I am one of the lucky first to encounter this
(or else, I am just not good enough at finding bugs on trackers).

I'll add information to the bug as I get them as soon as I can log on the
server.

Best regards,
Carm



--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to