Mirrors | Updates | Feedback | Changes | Wishlist | Team
Many versions of PSFTP and PSCP prior to 0.57 have a heap corruption vulnerability in their treatment of the response to the FXP_READDIR command (enumerate entries in a directory) in the SSH File Transfer Protocol (SFTP).
In order for this vulnerability to be exploited, the user connect to a
malicious server and issue a
command to PSFTP, or supply the
-ls command-line option
(Note however that the vulnerability kicks in after host key verification, so the host key of the server has to have been accepted to get this far.)
SFTP is always used by PSFTP; it is also used by PSCP if available
(depending on server behaviour). It can be used in both SSH-2 and
SSH-1 (again, depending on server behaviour). Thus, a malicious server
can exploit this in all invocations of PSFTP and PSCP, unless the
-scp option is supplied to PSCP.
This bug was discovered by a contributor to iDEFENSE's Vulnerability Contributor Program. Along with `vuln-sftp-string', it is documented in iDEFENSE's advisory 02.21.05, mentioned in Secunia's advisory SA14333, and has been assigned CVE ID CAN-2005-0467. It has also been individually assigned OSVDB ID 14002.
In response to an
FXP_READDIR request, the server returns
a count of directory entries, followed by the entries themselves. In
sftp.c:fxp_readdir_recv(), this count was passed to
snewn() to allocate memory, where it was used as a
multiplier for an internal structure size. With a sufficiently large
count, an integer overflow could be provoked in
such that insufficient memory could silently be
fxp:readdir_recv() would then read server-supplied data
into this buffer, leading to a heap corruption with server-controlled
contents, and hence potentially to execution of arbitrary code.
Audit trail for this vulnerability.