Bugtraq mailing list archives
[TL-Security-Announce] wu-ftpd TLSA2000014-1
From: jlittle () TURBOLINUX COM (Joe Little)
Date: Wed, 19 Jul 2000 17:31:35 -0700
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ___________________________________________________________________________ TurboLinux Security Announcement Package: wu-ftpd-2.6.0 and earlier Date: Wednesday July 19 17:00 PDT 2000 Affected TurboLinux versions: 4.0 (TCS/TLS) and earlier Vulnerability Type: remote root exploit via SITE EXEC TurboLinux Advisory ID#: TLSA2000014-1 Cert Advisory: CA-2000-13 ___________________________________________________________________________ A security hole was discovered in the package mentioned avobe. Please update the package in your installation as soon as possible or disable the service. ___________________________________________________________________________ 1. Problem Summary A buffer overrun exists in wu-ftpd versions prior to 2.6.1. Due to improper bounds checking, SITE EXEC may enable remote root execution, without having any local user account required. 2. Impact An attacker can use this exploit to remotely execute code on the machine where wu-ftpd is being used. This could easily lead to a remote root compromise. 3. Solution Update the package from our ftp server by running the following command: rpm -Fv ftp_path_to_filename Where ftp_path_to_filename is the following: ftp://ftp.turbolinux.com/pub/updates/4.0/security/wu-ftpd-2.6.1-1.i386.rpm The source RPM can be downloaded here: ftp://ftp.turbolinux.com/pub/updates/4.0/SRPMS/wu-ftpd-2.6.1-1.src.rpm **Note: You must rebuild and install the RPM if you choose to download and install the SRPM. Simply installing the SRPM alone WILL NOT CLOSE THE SECURITY HOLE. Please verify the MD5 checksum of the update before you install: MD5 sum Package Name - --------------------------------------------------------------------------- 0052bd2cd2e7f1fa1abadc5b2dd63a12 wu-ftpd-2.6.1-1.i386.rpm 3c914377251bba7bda0f34358e6a4576 wu-ftpd-2.6.1-1.src.rpm ___________________________________________________________________________ These packages are GPG signed by Turbolinux for security. Our key is available here: http://www.turbolinux.com/security/tlgpgkey.asc To verify a package, use the following command: rpm --checksig name_of_rpm To examine only the md5sum, use the following command: rpm --checksig --nogpg name_of_rpm **Note: Checking GPG keys requires RPM 3.0 or higher. ___________________________________________________________________________ You can find more updates on our ftp server: ftp://ftp.turbolinux.com/pub/updates/6.0/security/ for TL6.0 Workstation and Server security updates ftp://ftp.turbolinux.com/pub/updates/4.0/security/ for TL4.0 Workstation and Server security updates Our webpage for security announcements: http://www.turbolinux.com/security If you want to report vulnerabilities, please contact: rt-security () turbolinux com ___________________________________________________________________________ Subscribe to the TurboLinux Security Mailing lists: TL-security - A moderated list for discussing security issues in TurboLinux products. Subscribe at http://www.turbolinux.com/mailman/listinfo/tl-security TL-security-announce - An announce-only mailing list for security updates and alerts. Subscribe at http://www.turbolinux.com/mailman/listinfo/tl-security-announce -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.2 (GNU/Linux) Comment: For info see http://www.gnupg.org iD8DBQE5dkd37eR7bnHQKeQRAumrAJ9Qyf7h1pWmIy3N91ALB6bymVekKQCdEoDT 73goehL00RO8i2f77btL5+c= =Zltp -----END PGP SIGNATURE----- _______________________________________________ TL-Security-Announce mailing list TL-Security-Announce () www turbolinux com http://www.turbolinux.com/mailman/listinfo/tl-security-announce
Current thread:
- Re: CheckPoint FW1 BUG, (continued)
- Re: CheckPoint FW1 BUG Hugo.van.der.Kooij () CAIW NL (Jul 14)
- Re: CheckPoint FW1 BUG Jon Paul, Nollmann (Jul 17)
- Re: CheckPoint FW1 BUG Benjamin Smee (Jul 19)
- HP Jetdirect - Invalid FTP Command DoS Peter Grundl (Jul 19)
- Re: CheckPoint FW1 BUG Per Hoff (Jul 19)
- Alert: Buffer Overrun is O'Reilly WebsitePro httpd32.exe (CISADV000717) Cerberus Security Team (Jul 19)
- Alert: Buffer Overrun is O'Reilly WebsitePro webfind.exe (CISADV000718) Cerberus Security Team (Jul 19)
- Outlook exploit fix opens old hole? Ben (Jul 19)
- [COVERT-2000-08] O'Reilly WebSite Professional Overflow COVERT Labs (Jul 19)
- Security Fix for Blackboard CourseInfo 4.0 aleph1 () securityfocus com (Jul 19)
- [TL-Security-Announce] wu-ftpd TLSA2000014-1 Joe Little (Jul 19)
- @stake iKey 1000 Security Advisory Kingpin (Jul 20)
- Re: @stake iKey 1000 Security Advisory Darren Reed (Jul 20)
- Security Update: DoS on gpm Technical Support (Jul 20)
- Re: CheckPoint FW1 BUG Nicolas FISCHBACH (Jul 18)
- [Paper] Format bugs. Pascal Bouchareine (Jul 18)
- (New ?) Macro security hole in Word 97 Bongard, Dominique (Jul 21)
- Re: (New ?) Macro security hole in Word 97 Bronek Kozicki (Jul 22)