Deb: Buffer overflow in some ftp servers

    Date12 Jan 2000
    CategoryDebian
    3128
    Posted ByLinuxSecurity Advisories
    The wu-ftpd-academ and proftpd packages distributed in Debian GNU/Linux 2.0 (hamm) are vulnerable to a buffer overflow. It is possible to gain shell access to the machine, and we recommend upgrading these packages immediately.
    Date Reported:
    10 Feb 1999
    Affected Packages:
    proftpd, wu-ftpd-academ
    Vulnerable:
    Yes
    For more information:
    http://www.netect.com/advisory_0 209.html
    Fixed in:
    The wu-ftpd-academ and proftpd packages distributed in Debian GNU/Linux 2.0 (hamm) are vulnerable to a buffer overflow. It is possible to gain shell access to the machine, and we recommend upgrading these packages immediately.

    PROFTPD:
    source: ftp://ftp.debian.org/debian/dists/stable/main/source/net/proftpd_1 .2.0pre1.orig.tar.gz, ftp://ftp.debian.org/debian/dists/stable/main/source/net/proftpd_1.2. 0pre1-2.diff.gz, ftp://ftp.debian.org/debian/dists/stable/main/source/net/proftpd_1.2.0pre 1-2.dsc
    i386: ftp://ftp.debian.org/debian/dists/stable/main/binary- i386/net/proftpd_1.2.0pre1-2.deb
    m68k: ftp://ftp.debian.org/debian/dists/stable/main/binary- m68k/proftpd_1.2.0pre1-2.deb
    WU-FTPD:
    source: ftp://ftp.debian.org/debian/dists/stable/main/sourc e/net/wu-ftpd-academ_2.4.2.16.orig.tar.gz, ftp://ftp.debian.org/debian/dists/stable/main/source/net/wu-ftpd- academ_2.4.2.16-12.2.diff.gz, ftp://ftp.debian.org/debian/dists/stable/main/sourc/net/wu-ftpd- academ_2.4.2.16-12.2.dsc
    i386: ftp://ftp.debian.org/debian/dists/stable/main/binary-i386/net/wu-ftpd- academ_2.4.2.16-12.2.deb
    m68k: ftp://ftp.debian.org/debian/dists/stable/main/binary-m68k/net/wu-ftpd- academ_2.4.2.16-12.2.deb

    If you are using debian 2.1 (slink) you should download the versions above, or more recent versions if available. Note that wu-ftpd will install in a disabled state on some configurations; you can enable wu-ftpd by uncommenting the line for /usr/sbin/ftpd in /etc/inetd.conf and running "/etc/init.d/netbase reload". The line for /usr/sbin/in.ftpd should remain disabled.

    md5:
    6fa9921e694972015d4e3d34184c4f2b proftpd_1.2.0pre1-2_i386.deb
    52053f8b9f348ff1929db91951cf394f proftpd_1.2.0pre1-2_m68k.deb
    b851adb345917a6f92e8b03f8cc97ff2 wu-ftpd-academ_2.4.2.16-12.2_i386.deb
    9302526c8c6368f87e805e943ce66875 wu-ftpd-academ_2.4.2.16-12.2_m68k.deb

    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"22","type":"x","order":"1","pct":55,"resources":[]},{"id":"88","title":"Should be more technical","votes":"5","type":"x","order":"2","pct":12.5,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"13","type":"x","order":"3","pct":32.5,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.