Linux Security
Linux Security
Linux Security

Deb: Buffer overflow in some ftp servers

Date 12 Jan 2000
4035
Posted By LinuxSecurity Advisories
The wu-ftpd-academ and proftpd packages distributed in Debian GNU/Linux 2.0 (hamm) are vulnerable to a buffer overflow. It is possible to gain shell access to the machine, and we recommend upgrading these packages immediately.
Date Reported:
10 Feb 1999
Affected Packages:
proftpd, wu-ftpd-academ
Vulnerable:
Yes
For more information:
https://www.netect.com/advisory_0 209.html
Fixed in:
The wu-ftpd-academ and proftpd packages distributed in Debian GNU/Linux 2.0 (hamm) are vulnerable to a buffer overflow. It is possible to gain shell access to the machine, and we recommend upgrading these packages immediately.

PROFTPD:
source: ftp://ftp.debian.org/debian/dists/stable/main/source/net/proftpd_1 .2.0pre1.orig.tar.gz, ftp://ftp.debian.org/debian/dists/stable/main/source/net/proftpd_1.2. 0pre1-2.diff.gz, ftp://ftp.debian.org/debian/dists/stable/main/source/net/proftpd_1.2.0pre 1-2.dsc
i386: ftp://ftp.debian.org/debian/dists/stable/main/binary- i386/net/proftpd_1.2.0pre1-2.deb
m68k: ftp://ftp.debian.org/debian/dists/stable/main/binary- m68k/proftpd_1.2.0pre1-2.deb
WU-FTPD:
source: ftp://ftp.debian.org/debian/dists/stable/main/sourc e/net/wu-ftpd-academ_2.4.2.16.orig.tar.gz, ftp://ftp.debian.org/debian/dists/stable/main/source/net/wu-ftpd- academ_2.4.2.16-12.2.diff.gz, ftp://ftp.debian.org/debian/dists/stable/main/sourc/net/wu-ftpd- academ_2.4.2.16-12.2.dsc
i386: ftp://ftp.debian.org/debian/dists/stable/main/binary-i386/net/wu-ftpd- academ_2.4.2.16-12.2.deb
m68k: ftp://ftp.debian.org/debian/dists/stable/main/binary-m68k/net/wu-ftpd- academ_2.4.2.16-12.2.deb

If you are using debian 2.1 (slink) you should download the versions above, or more recent versions if available. Note that wu-ftpd will install in a disabled state on some configurations; you can enable wu-ftpd by uncommenting the line for /usr/sbin/ftpd in /etc/inetd.conf and running "/etc/init.d/netbase reload". The line for /usr/sbin/in.ftpd should remain disabled.

md5:
6fa9921e694972015d4e3d34184c4f2b proftpd_1.2.0pre1-2_i386.deb
52053f8b9f348ff1929db91951cf394f proftpd_1.2.0pre1-2_m68k.deb
b851adb345917a6f92e8b03f8cc97ff2 wu-ftpd-academ_2.4.2.16-12.2_i386.deb
9302526c8c6368f87e805e943ce66875 wu-ftpd-academ_2.4.2.16-12.2_m68k.deb

Advisories

LinuxSecurity Poll

How frequently do you patch/update your system?

No answer selected. Please try again.
Please select either existing option or enter your own, however not both.
Please select minimum 0 answer(s) and maximum 3 answer(s).
/main-polls/52-how-frequently-do-you-patch-update-your-system?task=poll.vote&format=json
52
radio
[{"id":"179","title":"As soon as patches\/updates are released - I track advisories for my distro(s) diligently","votes":"43","type":"x","order":"1","pct":81.13,"resources":[]},{"id":"180","title":"Every so often, when I think of it","votes":"5","type":"x","order":"2","pct":9.43,"resources":[]},{"id":"181","title":"Hardly ever","votes":"5","type":"x","order":"3","pct":9.43,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

Please vote first in order to view vote results.

VOTE ON THE POLL PAGE


VIEW MORE POLLS

bottom 200

Please enable / Bitte aktiviere JavaScript!
Veuillez activer / Por favor activa el Javascript![ ? ]

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.