Bug 233592 - (CVE-2007-1564) CVE-2007-1564 FTP protocol PASV design flaw affects konqueror
CVE-2007-1564 FTP protocol PASV design flaw affects konqueror
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
All Linux
low Severity low
: ---
: ---
Assigned To: Ngo Than
Radek Bíba
: Security
Depends On: 293551 293561 293571 293581
  Show dependency treegraph
Reported: 2007-03-23 08:09 EDT by Red Hat Product Security
Modified: 2011-09-27 17:51 EDT (History)
2 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Last Closed: 2011-09-27 17:51:29 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)

External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2007:0909 normal SHIPPED_LIVE Moderate: kdelibs security update 2008-01-08 20:17:18 EST

  None (edit)
Description Lubomir Kundrak 2007-03-23 08:09:21 EDT
Description of problem:

RFC 959 [1] says:

      When the user-PI receives an acknowledgment to the PASV command,
      which includes the identity of the host and port being listened
      on, the user-PI then sends A's port, a, to B in a PORT command; a
      reply is returned.  The user-PI may then send the corresponding
      service commands to A and B.  Server B initiates the connection
      and the transfer proceeds.

[1] ftp://ftp.rfc-editor.org/in-notes/rfc959.txt

This makes in possible for a server to direct the client to connect to
arbitrary IP/PORT, what can be misused for port scanning and service

Steps to Reproduce:

The paper [2] explains how to reproduce and contains a reference to
example reproducer FTP server.

[2] http://bindshell.net/papers/ftppasv/ftp-client-pasv-manipulation.pdf

Additional info:

This is a documented behavior. Anyways, Mozilla is going to fix this,
not sure about Konqueror. It is possible that other browsers we ship,
including w3m, links or lynx contain the flaw, but I don't feel positive
about urging to changing their behavior in any way, unless upstreams
change it because according to the RFC the behavior is correct.
Comment 2 Tomas Hoger 2007-09-12 07:14:22 EDT
Official KDE security advisory with references to upstream patches:

Comment 8 Red Hat Bugzilla 2009-10-23 15:05:15 EDT
Reporter changed to security-response-team@redhat.com by request of Jay Turner.
Comment 10 Kurt Seifried 2011-09-27 17:51:57 EDT
This issue has been addressed in following products:

  Red Hat Linux Enterprise 4
  Red Hat Linux Enterprise 4.5.z
  Red Hat Linux Enterprise 5

Via RHSA-2007:0909 https://rhn.redhat.com/errata/RHSA-2007-0909.html

Note You need to log in before you can comment on or make changes to this bug.