Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 27 Nov 2001 21:02:13 -0500
From:      Mike Tancsa <mike@sentex.net>
To:        freebsd-security@freebsd.org
Subject:   wu-ftpd ?
Message-ID:  <5.1.0.14.0.20011127210017.0545a5e0@192.168.0.12>

next in thread | raw e-mail | index | archive | help

I guess the post below is relates to what was on bugtraq last week about 
the mysterious new wu-ftpd vulnerability. I still dont see anything on 
wu-ftpd's site about it.  Is this something specific to LINUX then ? Anyone 
have any info ?

         ---Mike



>Mailing-List: contact bugtraq-help@securityfocus.com; run by ezmlm
>List-Id: <bugtraq.list-id.securityfocus.com>
>List-Post: <mailto:bugtraq@securityfocus.com>
>List-Help: <mailto:bugtraq-help@securityfocus.com>
>List-Unsubscribe: <mailto:bugtraq-unsubscribe@securityfocus.com>
>List-Subscribe: <mailto:bugtraq-subscribe@securityfocus.com>
>Delivered-To: mailing list bugtraq@securityfocus.com
>Delivered-To: moderator for bugtraq@securityfocus.com
>Subject: [RHSA-2001:157-06] Updated wu-ftpd packages are available
>From: bugzilla@redhat.com
>Date: Tue, 27 Nov 2001 18:37 -0500
>To: redhat-watch-list@redhat.com
>Cc: bugtraq@securityfocus.com, linux-security@redhat.com
>X-Virus-Scanned: by AMaViS perl-10
>X-MIME-Autoconverted: from quoted-printable to 8bit by 
>cage.simianscience.com id fAS1enD40368
>
>---------------------------------------------------------------------
>                    Red Hat, Inc. Red Hat Security Advisory
>
>Synopsis:          Updated wu-ftpd packages are available
>Advisory ID:       RHSA-2001:157-06
>Issue date:        2001-11-20
>Updated on:        2001-11-26
>Product:           Red Hat Linux
>Keywords:          wu-ftpd buffer overrun glob ftpglob
>Cross references:
>Obsoletes:         RHSA-2000:039
>---------------------------------------------------------------------
>
>1. Topic:
>
>Updated wu-ftpd packages are available to fix an overflowable buffer.
>
>2. Relevant releases/architectures:
>
>Red Hat Linux 6.2 - alpha, i386, sparc
>
>Red Hat Linux 7.0 - alpha, i386
>
>Red Hat Linux 7.1 - alpha, i386, ia64
>
>Red Hat Linux 7.2 - i386
>
>3. Problem description:
>
>An overflowable buffer exists in earlier versions of wu-ftpd.
>An attacker could gain access to the machine by sending malicious
>commands.
>
>It is recommended that all users of wu-ftpd upgrade to the lastest
>version.
>
>4. Solution:
>
>Before applying this update, make sure all previously released errata
>relevant to your system have been applied.
>
>To update all RPMs for your particular architecture, run:
>
>rpm -Fvh [filenames]
>
>where [filenames] is a list of the RPMs you wish to upgrade.  Only those
>RPMs which are currently installed will be updated.  Those RPMs which are
>not installed but included in the list will not be updated.  Note that you
>can also use wildcards (*.rpm) if your current directory *only* contains the
>desired RPMs.
>
>Please note that this update is also available via Red Hat Network.  Many
>people find this an easier way to apply updates.  To use Red Hat Network,
>launch the Red Hat Update Agent with the following command:
>
>up2date
>
>This will start an interactive process that will result in the appropriate
>RPMs being upgraded on your system.
>
>5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):
>
>
>
>6. RPMs required:
>
>Red Hat Linux 6.2:
>
>SRPMS:
>ftp://updates.redhat.com/6.2/en/os/SRPMS/wu-ftpd-2.6.1-0.6x.21.src.rpm
>
>alpha:
>ftp://updates.redhat.com/6.2/en/os/alpha/wu-ftpd-2.6.1-0.6x.21.alpha.rpm
>
>i386:
>ftp://updates.redhat.com/6.2/en/os/i386/wu-ftpd-2.6.1-0.6x.21.i386.rpm
>
>sparc:
>ftp://updates.redhat.com/6.2/en/os/sparc/wu-ftpd-2.6.1-0.6x.21.sparc.rpm
>
>Red Hat Linux 7.0:
>
>SRPMS:
>ftp://updates.redhat.com/7.0/en/os/SRPMS/wu-ftpd-2.6.1-16.7x.1.src.rpm
>
>alpha:
>ftp://updates.redhat.com/7.0/en/os/alpha/wu-ftpd-2.6.1-16.7x.1.alpha.rpm
>
>i386:
>ftp://updates.redhat.com/7.0/en/os/i386/wu-ftpd-2.6.1-16.7x.1.i386.rpm
>
>Red Hat Linux 7.1:
>
>SRPMS:
>ftp://updates.redhat.com/7.1/en/os/SRPMS/wu-ftpd-2.6.1-16.7x.1.src.rpm
>
>alpha:
>ftp://updates.redhat.com/7.1/en/os/alpha/wu-ftpd-2.6.1-16.7x.1.alpha.rpm
>
>i386:
>ftp://updates.redhat.com/7.1/en/os/i386/wu-ftpd-2.6.1-16.7x.1.i386.rpm
>
>ia64:
>ftp://updates.redhat.com/7.1/en/os/ia64/wu-ftpd-2.6.1-16.7x.1.ia64.rpm
>
>Red Hat Linux 7.2:
>
>SRPMS:
>ftp://updates.redhat.com/7.2/en/os/SRPMS/wu-ftpd-2.6.1-20.src.rpm
>
>i386:
>ftp://updates.redhat.com/7.2/en/os/i386/wu-ftpd-2.6.1-20.i386.rpm
>
>
>
>7. Verification:
>
>MD5 sum                          Package Name
>--------------------------------------------------------------------------
>a33d4557c473b88cc7bed8718bd07a2f 6.2/en/os/SRPMS/wu-ftpd-2.6.1-0.6x.21.src.rpm
>da84b22853f1048d45803ebeec8d061c 
>6.2/en/os/alpha/wu-ftpd-2.6.1-0.6x.21.alpha.rpm
>281fa607c3f6479e369673cb9247d169 6.2/en/os/i386/wu-ftpd-2.6.1-0.6x.21.i386.rpm
>20bf731056d48351d2194956f4762091 
>6.2/en/os/sparc/wu-ftpd-2.6.1-0.6x.21.sparc.rpm
>52406d7ddd2c14c669a8c9203f99ac5c 7.0/en/os/SRPMS/wu-ftpd-2.6.1-16.7x.1.src.rpm
>35315a5fa466beb3bdc26aa4fc1c872f 
>7.0/en/os/alpha/wu-ftpd-2.6.1-16.7x.1.alpha.rpm
>c97683b85603d34853b3825c9b694f20 7.0/en/os/i386/wu-ftpd-2.6.1-16.7x.1.i386.rpm
>52406d7ddd2c14c669a8c9203f99ac5c 7.1/en/os/SRPMS/wu-ftpd-2.6.1-16.7x.1.src.rpm
>35315a5fa466beb3bdc26aa4fc1c872f 
>7.1/en/os/alpha/wu-ftpd-2.6.1-16.7x.1.alpha.rpm
>c97683b85603d34853b3825c9b694f20 7.1/en/os/i386/wu-ftpd-2.6.1-16.7x.1.i386.rpm
>56af9e1de2b3d532e1e4dce18636f6c4 7.1/en/os/ia64/wu-ftpd-2.6.1-16.7x.1.ia64.rpm
>efd2a876ad8d7c4879d3eeaeeec7fcef 7.2/en/os/SRPMS/wu-ftpd-2.6.1-20.src.rpm
>7306f24d3d7d518068c5e08959d43bdd 7.2/en/os/i386/wu-ftpd-2.6.1-20.i386.rpm
>
>
>These packages are GPG signed by Red Hat, Inc. for security.  Our key
>is available at:
>     http://www.redhat.com/about/contact/pgpkey.html
>
>You can verify each package with the following command:
>     rpm --checksig  <filename>
>
>If you only wish to verify that each package has not been corrupted or
>tampered with, examine only the md5sum with the following command:
>     rpm --checksig --nogpg <filename>
>
>8. References:
>
>
>
>
>Copyright(c) 2000, 2001 Red Hat, Inc.

--------------------------------------------------------------------
Mike Tancsa,                          	          tel +1 519 651 3400
Sentex Communications,     			  mike@sentex.net
Providing Internet since 1994                    www.sentex.net
Cambridge, Ontario Canada			  www.sentex.net/mike


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?5.1.0.14.0.20011127210017.0545a5e0>