Linux Security
    Linux Security
    Linux Security

    Debian: New wzdftpd packages fix arbitrary shell command execution

    Date 16 Mar 2006
    Posted By LinuxSecurity Advisories
    Updated package.
    - --------------------------------------------------------------------------
    Debian Security Advisory DSA 1006-1                    This email address is being protected from spambots. You need JavaScript enabled to view it.                         Moritz Muehlenhoff
    March 16th, 2005              
    - --------------------------------------------------------------------------
    Package        : wzdftpd
    Vulnerability  : missing input sanitising
    Problem-Type   : remote
    Debian-specific: no
    CVE ID         : CVE-2005-3081
    "kcope" discovered that the wzdftpd FTP server lacks input sanitising
    for the SITE command, which may lead to the execution of arbitrary
    shell commands.
    The old stable distribution (woody) does not contain wzdftpd packages.
    For the stable distribution (sarge) this problem has been fixed in
    version 0.5.2-1.1sarge1.
    For the unstable distribution (sid) this problem has been fixed in
    version 0.5.5-1.
    We recommend that you upgrade your wzdftpd package.
    Upgrade Instructions
    - --------------------
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    Debian GNU/Linux 3.1 alias sarge
    - --------------------------------
      Source archives:
          Size/MD5 checksum:      770 9b5198715396dc3241b38522866236eb
          Size/MD5 checksum:    18064 56f5a27176316cbe9f6e33f271fa2137
          Size/MD5 checksum:   818860 62a4af39801fe581f85cd063c5fc4717
      Alpha architecture:
          Size/MD5 checksum:   309938 42447c188199c9cea54a0658801ce243
          Size/MD5 checksum:    30594 02069d4746a86be34df3fa9347f2392d
          Size/MD5 checksum:   293354 dbacd04240390145f75b69fdf27b7bc5
          Size/MD5 checksum:    48864 e01b156146c1a68bd3ae51f689dc8d46
          Size/MD5 checksum:    31408 431162de3997ddebd36b3982c85bd449
      AMD64 architecture:
          Size/MD5 checksum:   286298 589a84919dd29f5858d9be5db77a9f7f
          Size/MD5 checksum:    29872 df640d1cc2191eb6f1bfbdca5bf31b20
          Size/MD5 checksum:   217728 0feb9461d80aae2138823e63e0faef32
          Size/MD5 checksum:    47044 eccd196638b0cd8c953dc8944e4062af
          Size/MD5 checksum:    30774 361bcb02132181eefb2eb06402d134f9
      ARM architecture:
          Size/MD5 checksum:   268212 f89c5793822e3852a1e8c1badbca0d5e
          Size/MD5 checksum:    29184 afa126d2b1671d44c241dc3ddea35e86
          Size/MD5 checksum:   214212 f1c06effaa2cfb5d4ae141aaec1e1587
          Size/MD5 checksum:    45668 925aeb76dd948aec878fe160d5021130
          Size/MD5 checksum:    29498 4512a8bf5fc97a1ff2abb9c5124060c0
      Intel IA-32 architecture:
          Size/MD5 checksum:   276502 97f51d6d1e654df0bb6f081e25a9b650
          Size/MD5 checksum:    29168 1dbfb15d29d721099e5a2888b6de0c9b
          Size/MD5 checksum:   203180 c59debe41582c57b70d7eed81b9be115
          Size/MD5 checksum:    46674 f86486f9676c0f7e3e249b196a24cde1
          Size/MD5 checksum:    30088 c8fbc3003ecce59c4c24d1f8f7369f15
      Intel IA-64 architecture:
          Size/MD5 checksum:   354192 04aceb869b8a9c8e57fee71adc90d537
          Size/MD5 checksum:    32456 14d0b99688e8515893a8bf5c3220bb8b
          Size/MD5 checksum:   282944 a9ae730aff0dcbf4ba0b3ee08f9dab0d
          Size/MD5 checksum:    54360 2049692cafe786e479d2b43e830bc51c
          Size/MD5 checksum:    33342 11e06c91a0f5b9fbbf7614d68a8dc78d
      HP Precision architecture:
          Size/MD5 checksum:   304388 e37daa65966c7677bc04f039a2f8805b
          Size/MD5 checksum:    31080 606539b364478ff7c0f98f1750706c7a
          Size/MD5 checksum:   241700 cb5b2cd8dbbd8d92ff354eb8815993b3
          Size/MD5 checksum:    49198 71e240d7616e16e0996b9d46210608da
          Size/MD5 checksum:    31636 35ddc248ade34d8d2defa0b61ae2119c
      Motorola 680x0 architecture:
          Size/MD5 checksum:   262636 7b30cb3f1b5ff1697cb2772cdb8f38c8
          Size/MD5 checksum:    28948 54a546876f6a58b1a6e34a72fa9e51f3
          Size/MD5 checksum:   184634 9956717829c33c2087c92685e5d02185
          Size/MD5 checksum:    45140 a9263eb4a27bc175080ab2d01c18c598
          Size/MD5 checksum:    30038 ac1ee347780b2821c70d4203e36e75f8
      Big endian MIPS architecture:
          Size/MD5 checksum:   276908 5b2aa7efb2be3a351f939756b27a4396
          Size/MD5 checksum:    28698 78346a470cc748d66417bc5abc7b5aaa
          Size/MD5 checksum:   228986 31993898148caa1f647a4f8f1bcbb4ce
          Size/MD5 checksum:    42096 bfbad635bc67a27cef46e93b838f0517
          Size/MD5 checksum:    29542 7ae48fc75c3407e569bfdd3eb97a3a69
      Little endian MIPS architecture:
          Size/MD5 checksum:   277024 09f8b81617477a2bcfc2b4c2d786bba6
          Size/MD5 checksum:    28726 be66f9c712a7250d73b1e8e7c0031529
          Size/MD5 checksum:   228814 bdd734cc6e3801ba38d27103a2251d81
          Size/MD5 checksum:    41986 bcd24ad8a50125c8e05ff752a2237a91
          Size/MD5 checksum:    29506 062a6f05b6c63471c5d6c14c7fa7e0b7
      PowerPC architecture:
          Size/MD5 checksum:   288046 a813354bcd631bcd411e8b15ee8a13b7
          Size/MD5 checksum:    29692 70caafe1861540e3f16fe8c939082ad8
          Size/MD5 checksum:   226374 3e451d530c0bc2e9232301b11e778c08
          Size/MD5 checksum:    48462 6efc393f1a57d9568892e8a1a3265427
          Size/MD5 checksum:    31662 54fe559a61b46bc525ba48b1fd23ce22
      IBM S/390 architecture:
          Size/MD5 checksum:   291596 cb46f86ba2822f386ba7dde54ec40a48
          Size/MD5 checksum:    29634 e7879e3279371a66628be8638a0b2487
          Size/MD5 checksum:   217006 470280e35819dbc6f928ae392ce83fa6
          Size/MD5 checksum:    43734 a25305b50ee9433fad1c2bfcceb2119d
          Size/MD5 checksum:    30966 2e9e92254e188a2e52bd74cc76845c6d
      Sun Sparc architecture:
          Size/MD5 checksum:   273360 7b319237b23760df5e1004876bedb0d1
          Size/MD5 checksum:    29210 0a82c650b91e6023fb3d6f197926efba
          Size/MD5 checksum:   209674 9adeb90f4dd44019d52929f8c933a65a
          Size/MD5 checksum:    45458 81d39032c6161efa36e5b246e09d45c7
          Size/MD5 checksum:    29698 4f2760ea9123c4c12f79e3dd6f60a41f
      These files will probably be moved into the stable distribution on
      its next update.
    - ---------------------------------------------------------------------------------
    For apt-get: deb stable/updates main
    For dpkg-ftp: dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.


    LinuxSecurity Poll

    'Tis the season of giving! How have you given back to the open-source community?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    [{"id":"171","title":"I've contributed to the development of an open-source project.","votes":"13","type":"x","order":"1","pct":33.33,"resources":[]},{"id":"172","title":"I've reviewed open-source code for security bugs.","votes":"8","type":"x","order":"2","pct":20.51,"resources":[]},{"id":"173","title":"I've made a donation to an open-source project.","votes":"18","type":"x","order":"3","pct":46.15,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

    Please vote first in order to view vote results.


    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.