We have received reports that the proftpd package as distributed in Debian GNU/Linux 2.0 is vulnerable to a buffer overflow. Using this vulnerability, known as palmetto, it is possible to gain shell access or otherwise circumvent normal login access and logging mechanisms. This has been fixed in version 1.2.0pre1-2 We recommend you upgrade your proftpd package immediately. wget url will fetch the file for you dpkg -i file.deb will install the referenced file. Debian GNU/Linux 2.0 alias hamm - ------------------------------- This version of Debian was released only for the Intel and the Motorola 680x0 architecture. Source archives: d-updates/proftpd_1.2.0pre1.orig.tar.gz MD5 checksum: 40695cf2ce6a7ff70e36e2c4d140a50e MD5 checksum: b9709fc768ba863bef08729325a9c53a MD5 checksum: a2245a4681873caad9dd83002e653bb0 Intel architecture: MD5 checksum: 6fa9921e694972015d4e3d34184c4f2b Motorola 680x0 architecture: . MD5 checksum: 52053f8b9f348ff1929db91951cf394f These files will be moved into soon. For not yet released architectures please refer to the appropriate directory . - -- Debian GNU/Linux . Security Managers . security@debian.org debian-security-announce@lists.debian.org Christian Hudon . Wichert Akkerman . Martin Schulze . .

New versions of proftpd fixes buffer overflow

December 13, 1999
We have received reports that the proftpd package as distributed in Debian GNU/Linux 2.0 is vulnerable to a buffer overflow

Summary

This has been fixed in version 1.2.0pre1-2

We recommend you upgrade your proftpd package immediately.

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

Debian GNU/Linux 2.0 alias hamm

This version of Debian was released only for the Intel and the
Motorola 680x0 architecture.

Source archives:
d-updates/proftpd_1.2.0pre1.orig.tar.gz
MD5 checksum: 40695cf2ce6a7ff70e36e2c4d140a50e
MD5 checksum: b9709fc768ba863bef08729325a9c53a
MD5 checksum: a2245a4681873caad9dd83002e653bb0

Intel architecture:
MD5 checksum: 6fa9921e694972015d4e3d34184c4f2b

Motorola 680x0 architecture:
.
MD5 checksum: 52053f8b9f348ff1929db91951cf394f


These files will be moved into
soon.


For not yet released architectures please refer to the appropriate
directory .

- --
Debian GNU/Linux . Security Managers . security@debian.org
debian-security-announce@lists.debian.org
Christian Hudon . Wichert Akkerman . Martin Schulze
. .


Severity
We have received reports that the proftpd package as distributed
in Debian GNU/Linux 2.0 is vulnerable to a buffer overflow. Using this
vulnerability, known as palmetto, it is possible to gain shell access or
otherwise circumvent normal login access and logging mechanisms.

Related News