5236105 2000-06-28 21:13 /95 rader/ Postmaster Mottagare: Bugtraq (import) <11469> Ärende: [slackware-security] wu-ftpd remote exploit patched ------------------------------------------------------------ Approved-By: aleph1@SECURITYFOCUS.COM Delivered-To: bugtraq@lists.securityfocus.com Delivered-To: bugtraq@securityfocus.com MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 7bit X-Priority: 3 X-MSMail-Priority: Normal X-MimeOLE: Produced By Microsoft MimeOLE V5.00.2919.6600 Message-ID: <004c01bfe11c$a74034c0$8f585e3f@alanagroup> Date: Wed, 28 Jun 2000 12:19:36 -0400 Reply-To: Christopher Kager <chris@THEALANGROUP.COM> Sender: Bugtraq List <BUGTRAQ@SECURITYFOCUS.COM> From: Christopher Kager <chris@THEALANGROUP.COM> To: BUGTRAQ@SECURITYFOCUS.COM -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - ----- Original Message ----- From: "Slackware Security Team" <security@slackware.com> To: <slackware-security@slackware.com> Sent: Wednesday, June 28, 2000 5:18 AM Subject: [slackware-security] wu-ftpd remote exploit patched A remote exploit has been found in the FTP daemon, wu-ftpd. This can allow an attacker full access to your machine. The wu-ftpd daemon is part of the tcpip1.tgz package in the N series. A new tcpip1.tgz package is now available in the Slackware 7.1 tree. We have also provided a seperate patch package for users who have already installed Slackware 7.1 and just want the new FTP daemon. ========================================= wu-ftpd 2.6.0 AVAILABLE - (n6/tcpip1.tgz) ========================================= The recent root exploit in wu-ftpd has been patched and the new tcpip1.tgz is in the Slackware 7.1 tree: ftp://ftp.slackware.com/pub/slackware/slackware-7.1/slakware/n6/ A seperate wu-ftpd-only patch package is available in the patches/ subdirectory: ftp://ftp.slackware.com/pub/slackware/slackware-7.1/patches/ All users are strongly urged to upgrade to the patched wu-ftpd daemon. You only need to download one package to get the new FTP daemon. Here are the md5sums and checksums for the packages: 1660403894 62427 ./wu-ftpd-patch.tgz d42c1708634232f8bc6a396827959851 ./wu-ftpd-patch.tgz 3287743865 1017793 ./n6/tcpip1.tgz 7aff2b13086e881a6ee029d44a448f17 ./n6/tcpip1.tgz INSTALLATION INSTRUCTIONS FOR THE tcpip1.tgz PACKAGE: ---------------------------------------------------- If you have downloaded the new tcpip1.tgz package, you should bring the system into runlevel 1 and run upgradepkg on it: # telinit 1 # upgradepkg tcpip1.tgz # telinit 3 INSTALLATION INSTRUCTIONS FOR THE wu-ftpd-patch.tgz PACKAGE: ----------------------------------------------------------- If you have downloaded the wu-ftpd-patch.tgz package, you should bring the system into runlevel 1 and run installpkg on it: # telinit 1 # installpkg wu-ftpd-patch.tgz # telinit 3 Remember, it's also a good idea to backup configuration files before upgrading packages. - - Slackware Linux Security Team http://www.slackware.com -----BEGIN PGP SIGNATURE----- Version: PGPfreeware 6.5.2 for non-commercial use <http://www.pgp.com> iQA/AwUBOVollsngd47OM+yTEQIZsgCffHR0j80zHs9sl79XyZBtwBULuNsAn3mY tce8IvTDwbIul0DIFAbkees1 =mLB4 -----END PGP SIGNATURE----- (5236105) ------------------------------------------(Ombruten) 5255464 2000-07-06 01:24 /30 rader/ Postmaster Mottagare: Bugtraq (import) <11595> Ärende: Re: [slackware-security] wu-ftpd remote exploit patched ------------------------------------------------------------ Approved-By: aleph1@SECURITYFOCUS.COM Delivered-To: bugtraq@lists.securityfocus.com Delivered-To: BUGTRAQ@SECURITYFOCUS.COM MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Message-ID: <Pine.LNX.3.96.1000704112336.27080B-100000@madeira.physiol.ucl.ac.uk> Date: Tue, 4 Jul 2000 11:27:06 +0100 Reply-To: jim <jim@madeira.physiol.ucl.ac.uk> Sender: Bugtraq List <BUGTRAQ@SECURITYFOCUS.COM> From: jim <jim@madeira.physiol.ucl.ac.uk> To: BUGTRAQ@SECURITYFOCUS.COM In-Reply-To: <Pine.LNX.3.96.1000630140339.3058A-100000@madeira.physiol.ucl.ac.uk> On Fri, 30 Jun 2000, jim wrote: > It would appear though, that the _source_ for wu-ftpd, at least that in > the Slackware 7.1 source iso (md5sum 6f2dd5c32b82e71f9970074e8d9681f0) has > not been patched. Those of us who build Slackware components from source > should be aware of this and patch manually. I've now received clarification from the Slackware guys; there is an updated 7.1 source.iso which has been patched but might not have made it to all the mirror sites yet. The md5 sum you are looking for is c0fddaaa5efeaef9403dc7071bc00119 . Those who downloaded from a mirror site and got the first sum will still need to patch, of course. My apologies to Slackware for any confusion caused. jim -- http://madeira.physiol.ucl.ac.uk/people/jim/ "Revenge is an integral part of forgiving and forgetting" -The BOFH (5255464) ------------------------------------------(Ombruten)