DSM-G600, DNS-3xx and NSA-220 Hack Forum

Unfortunately no one can be told what fun_plug is - you have to see it for yourself.

You are not logged in.

Announcement

#1 2008-02-11 20:53:20

mazzer
Member
Registered: 2008-02-11
Posts: 13

FTP with FW 1.04

On the wiki, it mentions that the DNS-323 uses an unpatched WU-FTPD v2.6.2, which is vulnerable to exploits. It therefore recommends that you do not open ports on your router to allow external access to the stock FTP daemon.

However, when browsing the source code it appears (to my green eyes) that FW 1.04 introduces a different FTP daemon: Pure FTPd 1.0.21.

Is this secure enough (at this time) to allow for external access? Or am I mistaken about the change in daemon? Thanks.

Offline

 

#2 2008-02-20 18:55:54

mazzer
Member
Registered: 2008-02-11
Posts: 13

Re: FTP with FW 1.04

Bump ... does anyone know the answer here?

Offline

 

#3 2008-02-20 19:32:59

Tom0000
Member
Registered: 2008-01-31
Posts: 23

Re: FTP with FW 1.04

The secure is sftp and it is not it.

Offline

 

#4 2008-02-20 20:54:27

mazzer
Member
Registered: 2008-02-11
Posts: 13

Re: FTP with FW 1.04

I know the difference between sFTP and FTP. What I was asking is whether the included FTP daemon in firmware version 1.04 had the same vulnerabilities -- that is to say, bugs -- as FW 1.03.

I recognize that regular FTP transmits data and receives passwords in an unencrypted manner. What I'm wondering is if the FTP daemon has been patched to prevent hackers from using buffer overflows and other tactics to allow execution of arbitray code. (Presumably this is the nature of the "exploits" reported on the wiki.)

Offline

 

Board footer

Powered by PunBB
© Copyright 2002–2010 PunBB