- ------------------------------------------------------------------------
Debian Security Advisory 357-1                    security@debian.org 
Debian -- Security Information                          Michael Stone
July 31, 2003                       Debian -- Debian security FAQ 
- ------------------------------------------------------------------------

Package        : wu-ftpd
Vulnerability  : buffer overflow
Problem type   : remote root exploit
Debian-specific: no
CVE Id(s)      : CAN-2003-0466

iSEC Security Research reports that wu-ftpd contains an off-by-one bug
in the fb_realpath function which could be exploited by a logged-in user
(local or anonymous) to gain root privileges. A demonstration exploit is
reportedly available.

For the current stable distribution (woody) this problem has been fixed
in version 2.6.2-3woody1. 

For the unstable distribution (sid) an update will be available shortly.

We recommend you upgrade your wu-ftpd package immediately.

Upgrade instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian 3.0 (stable)
- -------------------

  Stable was released for alpha, arm, hppa, i386, ia64, m68k, mips, mipsel, powerpc, s390 and sparc.

  Source archives:

      
      Size/MD5 checksum:   354784 b3c271f02aadf663b8811d1bff9da3f6
      
      Size/MD5 checksum:      713 0e7285b9fd050b4e8a30aa21d62f44d8
      
      Size/MD5 checksum:    99967 88c990894af29cce4d14ee6822069542

  Architecture independent packages:

      
      Size/MD5 checksum:     3476 79da608623ce421a11c568e97565f537

  alpha architecture (DEC Alpha)

      
      Size/MD5 checksum:   291540 20b379bd4495f8d810cc75f4188e0f94

  arm architecture (ARM)

      
      Size/MD5 checksum:   265158 f5d590b10861f6f355d40d501cf35e75

  hppa architecture (HP PA RISC)

      
      Size/MD5 checksum:   275684 4cc9e3eb212401091d4f51ddf54dd771

  i386 architecture (Intel ia32)

      
      Size/MD5 checksum:   255102 f79202c825c979fafd8de828401a8179

  ia64 architecture (Intel ia64)

      
      Size/MD5 checksum:   321168 30d2ce430f8ae75eabf76d9f2427f6cb

  m68k architecture (Motorola Mc680x0)

      
      Size/MD5 checksum:   249258 79367429ca9b917c99db373c205da8f8

  mips architecture (MIPS (Big Endian))

    Not yet available.

  mipsel architecture (MIPS (Little Endian))

      
      Size/MD5 checksum:   272916 ec410054275c42450c6eb983cfc3e6e6

  powerpc architecture (PowerPC)

      
      Size/MD5 checksum:   268236 3e1954b334be827bdbbf43edb2336978

  s390 architecture (IBM S/390)

      
      Size/MD5 checksum:   262914 448c89adf5f1eabfafa9b944719d34ba

  sparc architecture (Sun SPARC/UltraSPARC)

      
      Size/MD5 checksum:   270306 5d5126fbaf637dffc0224b5a9e402cd1

- -------------------------------------------------------------------------------
For apt-get: deb  Debian -- Security Information  stable/updates main
For dpkg-ftp:    dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show ' and  http://packages.debian.org/



Debian: wu-ftpd buffer overflow vulnerability

August 1, 2003
iSEC Security Research reports that wu-ftpd contains an off-by-one bugin the fb_realpath function which could be exploited by a logged-in user(local or anonymous) to gain root priv...

Summary

iSEC Security Research reports that wu-ftpd contains an off-by-one bug
in the fb_realpath function which could be exploited by a logged-in user
(local or anonymous) to gain root privileges. A demonstration exploit is
reportedly available.

For the current stable distribution (woody) this problem has been fixed
in version 2.6.2-3woody1.

For the unstable distribution (sid) an update will be available shortly.

We recommend you upgrade your wu-ftpd package immediately.

Upgrade instructions
- --------------------

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian 3.0 (stable)
- -------------------

Stable was released for alpha, arm, hppa, i386, ia64, m68k, mips, mipsel, powerpc, s390 and sparc.

Source archives:


Size/MD5 checksum: 354784 b3c271f02aadf663b8811d1bff9da3f6

Size/MD5 checksum: 713 0e7285b9fd050b4e8a30aa21d62f44d8

Size/MD5 checksum: 99967 88c990894af29cce4d14ee6822069542

Architecture independent packages:


Size/MD5 checksum: 3476 79da608623ce421a11c568e97565f537

alpha architecture (DEC Alpha)


Size/MD5 checksum: 291540 20b379bd4495f8d810cc75f4188e0f94

arm architecture (ARM)


Size/MD5 checksum: 265158 f5d590b10861f6f355d40d501cf35e75

hppa architecture (HP PA RISC)


Size/MD5 checksum: 275684 4cc9e3eb212401091d4f51ddf54dd771

i386 architecture (Intel ia32)


Size/MD5 checksum: 255102 f79202c825c979fafd8de828401a8179

ia64 architecture (Intel ia64)


Size/MD5 checksum: 321168 30d2ce430f8ae75eabf76d9f2427f6cb

m68k architecture (Motorola Mc680x0)


Size/MD5 checksum: 249258 79367429ca9b917c99db373c205da8f8

mips architecture (MIPS (Big Endian))

Not yet available.

mipsel architecture (MIPS (Little Endian))


Size/MD5 checksum: 272916 ec410054275c42450c6eb983cfc3e6e6

powerpc architecture (PowerPC)


Size/MD5 checksum: 268236 3e1954b334be827bdbbf43edb2336978

s390 architecture (IBM S/390)


Size/MD5 checksum: 262914 448c89adf5f1eabfafa9b944719d34ba

sparc architecture (Sun SPARC/UltraSPARC)


Size/MD5 checksum: 270306 5d5126fbaf637dffc0224b5a9e402cd1

For apt-get: deb Debian -- Security Information stable/updates main
For dpkg-ftp: dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show ' and http://packages.debian.org/





Severity
Package : wu-ftpd
Vulnerability : buffer overflow
Problem type : remote root exploit
Debian-specific: no
CVE Id(s) : CAN-2003-0466

Related News