5285191 2000-07-20  07:35  /138 rader/ Postmaster
Mottagare: Bugtraq (import) <11817>
Ärende: [TL-Security-Announce] wu-ftpd TLSA2000014-1
------------------------------------------------------------
Approved-By: aleph1@SECURITYFOCUS.COM
Delivered-To: bugtraq@lists.securityfocus.com
Delivered-To: bugtraq@securityfocus.com
X-Authentication-Warning: eva.dev.us.tlan: jlittle owned process doing -bs
X-Sender: jlittle@eva.dev.us.tlan
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
X-Mailman-Version: 1.1
Precedence: bulk
List-Id: Announcements-only security lis 
        <tl-security-announce.www.turbolinux.com>
X-BeenThere: tl-security-announce@www.turbolinux.com
Message-ID:  <Pine.LNX.4.20.0007191730070.4704-100000@eva.dev.us.tlan>
Date:         Wed, 19 Jul 2000 17:31:35 -0700
Reply-To: tl-security-announce@www1.turbolinux.com
Sender: Bugtraq List <BUGTRAQ@SECURITYFOCUS.COM>
From: Joe Little <jlittle@TURBOLINUX.COM>
X-To:         tl-security-announce@turbolinux.com
To: BUGTRAQ@SECURITYFOCUS.COM

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

___________________________________________________________________________

                        TurboLinux Security Announcement


        Package: wu-ftpd-2.6.0 and earlier
        Date: Wednesday July 19 17:00 PDT 2000

        Affected TurboLinux versions: 4.0 (TCS/TLS) and earlier
        Vulnerability Type: remote root exploit via SITE EXEC
        TurboLinux Advisory ID#:  TLSA2000014-1
	Cert Advisory: CA-2000-13

___________________________________________________________________________

A security hole was discovered in the package mentioned avobe. Please
update the package in your installation as soon as possible or
disable the service.
___________________________________________________________________________

1. Problem Summary

A buffer overrun exists in wu-ftpd versions prior to 2.6.1. Due to
improper bounds checking, SITE EXEC may enable remote root execution,
without having any local user account required.

2. Impact

An attacker can use this exploit to remotely execute code on the
machine where wu-ftpd is being used.  This could easily lead to a
remote root compromise.

3. Solution

Update the package from our ftp server by running the following
command:

rpm -Fv ftp_path_to_filename

Where ftp_path_to_filename is the following:

ftp://ftp.turbolinux.com/pub/updates/4.0/security/wu-ftpd-2.6.1-1.i386.rpm

The source RPM can be downloaded here:

ftp://ftp.turbolinux.com/pub/updates/4.0/SRPMS/wu-ftpd-2.6.1-1.src.rpm

  **Note: You must rebuild and install the RPM if you choose to
  download and install the SRPM.  Simply installing the SRPM alone
  WILL NOT CLOSE THE SECURITY HOLE.

Please verify the MD5 checksum of the update before you install:

  MD5 sum                               Package Name
- ---------------------------------------------------------------------------
0052bd2cd2e7f1fa1abadc5b2dd63a12  wu-ftpd-2.6.1-1.i386.rpm
3c914377251bba7bda0f34358e6a4576  wu-ftpd-2.6.1-1.src.rpm
___________________________________________________________________________

These packages are GPG signed by Turbolinux for security. Our key
is available here:

 http://www.turbolinux.com/security/tlgpgkey.asc

To verify a package, use the following command:

 rpm --checksig name_of_rpm

To examine only the md5sum, use the following command:

 rpm --checksig --nogpg name_of_rpm

**Note: Checking GPG keys requires RPM 3.0 or higher.

___________________________________________________________________________
You can find more updates on our ftp server:

   ftp://ftp.turbolinux.com/pub/updates/6.0/security/ for TL6.0
   Workstation and Server security updates
   ftp://ftp.turbolinux.com/pub/updates/4.0/security/ for TL4.0
   Workstation and Server security updates

Our webpage for security announcements:

   http://www.turbolinux.com/security

If you want to report vulnerabilities, please contact:

   rt-security@turbolinux.com
___________________________________________________________________________

Subscribe to the TurboLinux Security Mailing lists:

  TL-security - A moderated list for discussing security issues in
  TurboLinux products.  Subscribe at
  http://www.turbolinux.com/mailman/listinfo/tl-security

  TL-security-announce - An announce-only mailing list for security
  updates and alerts.  Subscribe at
  http://www.turbolinux.com/mailman/listinfo/tl-security-announce

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.2 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iD8DBQE5dkd37eR7bnHQKeQRAumrAJ9Qyf7h1pWmIy3N91ALB6bymVekKQCdEoDT
73goehL00RO8i2f77btL5+c=
=Zltp
-----END PGP SIGNATURE-----



_______________________________________________
TL-Security-Announce mailing list
TL-Security-Announce@www.turbolinux.com
http://www.turbolinux.com/mailman/listinfo/tl-security-announce
(5285191) ------------------------------------------(Ombruten)