Opened 19 years ago

Last modified 19 years ago

#1769 closed defect

proftpd instructions — at Initial Version

Reported by: bdubbs@… Owned by: blfs-book@…
Priority: high Milestone: 6.2.0
Component: BOOK Version: SVN
Severity: normal Keywords:
Cc:

Description

From Alexander E. Patrakov:

the current BLFS instructions for proftpd include the following:

install_user=proftpd install_group=proftpd \

./configure --prefix=/usr --sysconfdir=/etc \ --localstatedir=/var/run

This results in the /usr/sbin/proftpd binary owned by the proftpd user. This is very wrong. Daemon binaries should be owned by root but run as a user.

Suppose that someone finds a security hole in proftpd that gives read-write access outside /home/ftp with the rights of the proftpd user (i.e., the user for anonymous access). This hole becomes a root hole then, because the attacker can overwrite /usr/sbin/proftpd and wait for a server reboot.

Change History (0)

Note: See TracTickets for help on using tickets.