--- Begin Message ---
- From: Michael Stone <mstone@klecker.debian.org>
- Subject: [SECURITY] [DSA-357-1] New wu-ftpd packages fix buffer overflow
- Date: Fri, 01 Aug 2003 00:01:28 +0200
- List-archive: <http://lists.debian.org/debian-security-announce/>
- List-help: <mailto:debian-security-announce-request@lists.debian.org?subject=help>
- List-id: <debian-security-announce.lists.debian.org>
- List-post: <mailto:debian-security-announce@lists.debian.org>
- List-subscribe: <mailto:debian-security-announce-request@lists.debian.org?subject=subscribe>
- List-unsubscribe: <mailto:debian-security-announce-request@lists.debian.org?subject=unsubscribe>
- Old-return-path: <mstone@klecker.debian.org>
- Priority: urgent
- Resent-date: Thu, 31 Jul 2003 17:01:33 -0500 (CDT)
- Resent-from: debian-security-announce@lists.debian.org
- Resent-message-id: <iMNVwB.A.y3D.8GZK_@murphy>
- Resent-sender: debian-security-announce-request@lists.debian.org
- X-bogosity: No, tests=bogofilter, spamicity=0.000000, version=0.13.7.2
- X-debian: PGP check passed for security officers
- X-loop: debian-security-announce@lists.debian.org
- X-mailing-list: <debian-security-announce@lists.debian.org>
- X-original-to: kmuto@xxxxxxxxxxxxxxx
- X-spam-checker-version: SpamAssassin 2.55 (1.174.2.19-2003-05-19-exp)
- X-spam-level:
- X-spam-status: No, hits=-107.5 required=10.0 tests=BAYES_00,PGP_SIGNATURE,USER_IN_WHITELIST,X_LOOP, X_MAILING_LIST autolearn=ham version=2.55
- X-virus-scanned: by amavisd-new-20030616-p3 (Debian) at topstudio.co.jp
- Message-id: <E19iLUG-0003Ld-00@klecker.debian.org>
-----BEGIN PGP SIGNED MESSAGE-----
- ------------------------------------------------------------------------
Debian Security Advisory 357-1 security@debian.org
http://www.debian.org/security/ Michael Stone
July 31, 2003 http://www.debian.org/security/faq
- ------------------------------------------------------------------------
Package : wu-ftpd
Vulnerability : buffer overflow
Problem type : remote root exploit
Debian-specific: no
CVE Id(s) : CAN-2003-0466
iSEC Security Research reports that wu-ftpd contains an off-by-one bug
in the fb_realpath function which could be exploited by a logged-in user
(local or anonymous) to gain root privileges. A demonstration exploit is
reportedly available.
For the current stable distribution (woody) this problem has been fixed
in version 2.6.2-3woody1.
For the unstable distribution (sid) an update will be available shortly.
We recommend you upgrade your wu-ftpd package immediately.
Upgrade instructions
- --------------------
wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
If you are using the apt-get package manager, use the line for
sources.list as given below:
apt-get update
will update the internal database
apt-get upgrade
will install corrected packages
You may use an automated update by adding the resources from the
footer to the proper configuration.
Debian 3.0 (stable)
- -------------------
Stable was released for alpha, arm, hppa, i386, ia64, m68k, mips, mipsel, powerpc, s390 and sparc.
Source archives:
http://security.debian.org/pool/updates/main/w/wu-ftpd/wu-ftpd_2.6.2.orig.tar.gz
Size/MD5 checksum: 354784 b3c271f02aadf663b8811d1bff9da3f6
http://security.debian.org/pool/updates/main/w/wu-ftpd/wu-ftpd_2.6.2-3woody1.dsc
Size/MD5 checksum: 713 0e7285b9fd050b4e8a30aa21d62f44d8
http://security.debian.org/pool/updates/main/w/wu-ftpd/wu-ftpd_2.6.2-3woody1.diff.gz
Size/MD5 checksum: 99967 88c990894af29cce4d14ee6822069542
Architecture independent packages:
http://security.debian.org/pool/updates/main/w/wu-ftpd/wu-ftpd-academ_2.6.2-3woody1_all.deb
Size/MD5 checksum: 3476 79da608623ce421a11c568e97565f537
alpha architecture (DEC Alpha)
http://security.debian.org/pool/updates/main/w/wu-ftpd/wu-ftpd_2.6.2-3woody1_alpha.deb
Size/MD5 checksum: 291540 20b379bd4495f8d810cc75f4188e0f94
arm architecture (ARM)
http://security.debian.org/pool/updates/main/w/wu-ftpd/wu-ftpd_2.6.2-3woody1_arm.deb
Size/MD5 checksum: 265158 f5d590b10861f6f355d40d501cf35e75
hppa architecture (HP PA RISC)
http://security.debian.org/pool/updates/main/w/wu-ftpd/wu-ftpd_2.6.2-3woody1_hppa.deb
Size/MD5 checksum: 275684 4cc9e3eb212401091d4f51ddf54dd771
i386 architecture (Intel ia32)
http://security.debian.org/pool/updates/main/w/wu-ftpd/wu-ftpd_2.6.2-3woody1_i386.deb
Size/MD5 checksum: 255102 f79202c825c979fafd8de828401a8179
ia64 architecture (Intel ia64)
http://security.debian.org/pool/updates/main/w/wu-ftpd/wu-ftpd_2.6.2-3woody1_ia64.deb
Size/MD5 checksum: 321168 30d2ce430f8ae75eabf76d9f2427f6cb
m68k architecture (Motorola Mc680x0)
http://security.debian.org/pool/updates/main/w/wu-ftpd/wu-ftpd_2.6.2-3woody1_m68k.deb
Size/MD5 checksum: 249258 79367429ca9b917c99db373c205da8f8
mips architecture (MIPS (Big Endian))
Not yet available.
mipsel architecture (MIPS (Little Endian))
http://security.debian.org/pool/updates/main/w/wu-ftpd/wu-ftpd_2.6.2-3woody1_mipsel.deb
Size/MD5 checksum: 272916 ec410054275c42450c6eb983cfc3e6e6
powerpc architecture (PowerPC)
http://security.debian.org/pool/updates/main/w/wu-ftpd/wu-ftpd_2.6.2-3woody1_powerpc.deb
Size/MD5 checksum: 268236 3e1954b334be827bdbbf43edb2336978
s390 architecture (IBM S/390)
http://security.debian.org/pool/updates/main/w/wu-ftpd/wu-ftpd_2.6.2-3woody1_s390.deb
Size/MD5 checksum: 262914 448c89adf5f1eabfafa9b944719d34ba
sparc architecture (Sun SPARC/UltraSPARC)
http://security.debian.org/pool/updates/main/w/wu-ftpd/wu-ftpd_2.6.2-3woody1_sparc.deb
Size/MD5 checksum: 270306 5d5126fbaf637dffc0224b5a9e402cd1
- -------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.2 (GNU/Linux)
iQCVAwUBPymORg0hVr09l8FJAQFEDwQAv0fIMiermzZcUVlcQO+98bPm0axQIddy
Q4RKp4EKZCfIErYqqkq0A4LIl58hzJ12H/56wBBSRlb+/cNcwb/0MTPz0cWhX62X
T5pXG3ybGhCOgqnu8rKjPhWf65V0S+knx5hdOItpluGZWmKWQKDHmBrRjl28iyU0
j6QKq4EKzPc=
=paUO
-----END PGP SIGNATURE-----
--
To UNSUBSCRIBE, email to debian-security-announce-request@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org
--- End Message ---