5285191 2000-07-20 07:35 /138 rader/ Postmaster Mottagare: Bugtraq (import) <11817> Ärende: [TL-Security-Announce] wu-ftpd TLSA2000014-1 ------------------------------------------------------------ Approved-By: aleph1@SECURITYFOCUS.COM Delivered-To: bugtraq@lists.securityfocus.com Delivered-To: bugtraq@securityfocus.com X-Authentication-Warning: eva.dev.us.tlan: jlittle owned process doing -bs X-Sender: jlittle@eva.dev.us.tlan MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII X-Mailman-Version: 1.1 Precedence: bulk List-Id: Announcements-only security lis <tl-security-announce.www.turbolinux.com> X-BeenThere: tl-security-announce@www.turbolinux.com Message-ID: <Pine.LNX.4.20.0007191730070.4704-100000@eva.dev.us.tlan> Date: Wed, 19 Jul 2000 17:31:35 -0700 Reply-To: tl-security-announce@www1.turbolinux.com Sender: Bugtraq List <BUGTRAQ@SECURITYFOCUS.COM> From: Joe Little <jlittle@TURBOLINUX.COM> X-To: tl-security-announce@turbolinux.com To: BUGTRAQ@SECURITYFOCUS.COM -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ___________________________________________________________________________ TurboLinux Security Announcement Package: wu-ftpd-2.6.0 and earlier Date: Wednesday July 19 17:00 PDT 2000 Affected TurboLinux versions: 4.0 (TCS/TLS) and earlier Vulnerability Type: remote root exploit via SITE EXEC TurboLinux Advisory ID#: TLSA2000014-1 Cert Advisory: CA-2000-13 ___________________________________________________________________________ A security hole was discovered in the package mentioned avobe. Please update the package in your installation as soon as possible or disable the service. ___________________________________________________________________________ 1. Problem Summary A buffer overrun exists in wu-ftpd versions prior to 2.6.1. Due to improper bounds checking, SITE EXEC may enable remote root execution, without having any local user account required. 2. Impact An attacker can use this exploit to remotely execute code on the machine where wu-ftpd is being used. This could easily lead to a remote root compromise. 3. Solution Update the package from our ftp server by running the following command: rpm -Fv ftp_path_to_filename Where ftp_path_to_filename is the following: ftp://ftp.turbolinux.com/pub/updates/4.0/security/wu-ftpd-2.6.1-1.i386.rpm The source RPM can be downloaded here: ftp://ftp.turbolinux.com/pub/updates/4.0/SRPMS/wu-ftpd-2.6.1-1.src.rpm **Note: You must rebuild and install the RPM if you choose to download and install the SRPM. Simply installing the SRPM alone WILL NOT CLOSE THE SECURITY HOLE. Please verify the MD5 checksum of the update before you install: MD5 sum Package Name - --------------------------------------------------------------------------- 0052bd2cd2e7f1fa1abadc5b2dd63a12 wu-ftpd-2.6.1-1.i386.rpm 3c914377251bba7bda0f34358e6a4576 wu-ftpd-2.6.1-1.src.rpm ___________________________________________________________________________ These packages are GPG signed by Turbolinux for security. Our key is available here: http://www.turbolinux.com/security/tlgpgkey.asc To verify a package, use the following command: rpm --checksig name_of_rpm To examine only the md5sum, use the following command: rpm --checksig --nogpg name_of_rpm **Note: Checking GPG keys requires RPM 3.0 or higher. ___________________________________________________________________________ You can find more updates on our ftp server: ftp://ftp.turbolinux.com/pub/updates/6.0/security/ for TL6.0 Workstation and Server security updates ftp://ftp.turbolinux.com/pub/updates/4.0/security/ for TL4.0 Workstation and Server security updates Our webpage for security announcements: http://www.turbolinux.com/security If you want to report vulnerabilities, please contact: rt-security@turbolinux.com ___________________________________________________________________________ Subscribe to the TurboLinux Security Mailing lists: TL-security - A moderated list for discussing security issues in TurboLinux products. Subscribe at http://www.turbolinux.com/mailman/listinfo/tl-security TL-security-announce - An announce-only mailing list for security updates and alerts. Subscribe at http://www.turbolinux.com/mailman/listinfo/tl-security-announce -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.2 (GNU/Linux) Comment: For info see http://www.gnupg.org iD8DBQE5dkd37eR7bnHQKeQRAumrAJ9Qyf7h1pWmIy3N91ALB6bymVekKQCdEoDT 73goehL00RO8i2f77btL5+c= =Zltp -----END PGP SIGNATURE----- _______________________________________________ TL-Security-Announce mailing list TL-Security-Announce@www.turbolinux.com http://www.turbolinux.com/mailman/listinfo/tl-security-announce (5285191) ------------------------------------------(Ombruten)