A vulnerability involving an input validation error in the "site exec"
command has recently been identified in the wu-ftpd program (CERT Advisory
CA-2000-13).  More information about this problem can be found at this site:

    2000 CERT Advisories

The wu-ftpd daemon is part of the tcpip1.tgz package in the N series.  A
new tcpip1.tgz package is now available in the Slackware -current tree.
All users of Slackware 7.0, 7.1, and -current are stronly urged to upgrade
to the new tcpip1.tgz package.

For users of Slackware 4.0, a wuftpd.tgz patch package is being provided
in the /patches tree of Slackware 4.0.


========================================wu-ftpd 2.6.1 AVAILABLE - (n1/tcpip1.tgz)
========================================
   FOR USERS OF SLACKWARE 7.0, 7.1, and -current:
   ---------------------------------------------   The recent vulnerability in wu-ftpd can be fixed by upgrading to the
   new tcpip1.tgz package.  This package upgrades the wu-ftpd server to
   version 2.6.1.  You can download it from the -current branch:

      
 

   All users of Slackware 7.0, 7.1, and -current are strongly urged to 
   upgrade to the tcpip1.tgz package to fix the vulnerability in wu-ftpd.

   For verification purposes, we provide the following checksums:

      16-bit "sum" checksum:
      45865   995

      128-bit MD5 message digest:
      2ffec28ac4b9de34d5899f7cd88cc5c3  n1/tcpip1.tgz

   Installation instructions for the tcpip1.tgz package:

      If you have downloaded the new tcpip1.tgz package, you should bring
      the system into runlevel 1 and run upgradepkg on it:

         # telinit 1
         # upgradepkg tcpip1.tgz
         # telinit 3


   FOR USERS OF SLACKWARE 4.0:
   --------------------------   
   The recent vulnerability in wu-ftpd can be fixed by installing the
   wuftpd.tgz patch package.  This package upgrades the wu-ftpd server
   to version 2.6.1.  You can download it from the Slackware 4.0 branch:

        

   All users of Slackware 4.0 are strongly urged to install the wuftpd.tgz
   patch package to fix the vulnerability in wu-ftpd.

   For verification purposes, we provide the following checksums:

      16-bit "sum" checksum:
      06607   105

      128-bit MD5 message digest:
      75547b1762d7ff4fad233cd89529ff2c  wuftpd.tgz

   Installation instructions for the wuftpd.tgz package:

      If you have downloaded the wuftpd.tgz patch package, you should bring
      the system into runlevel 1 and run installpkg on it:

         # telinit 1
         # installpkg wuftpd.tgz
         # telinit 3


Remember, it's also a good idea to backup configuration files before
upgrading packages.

Slackware: 'wu-ftpd' update CA-2000-13

September 29, 2000

A vulnerability involving an input validation error in the "site exec" command has recently been identified in the wu-ftpd program (CERT Advisory CA-2000-13).

Summary

Where Find New Packages

MD5 Signatures

Severity
A vulnerability involving an input validation error in the "site exec" command has recently been identified in the wu-ftpd program (CERT Advisory CA-2000-13). More information about this problem can be found at this site: 2000 CERT Advisories The wu-ftpd daemon is part of the tcpip1.tgz package in the N series. A new tcpip1.tgz package is now available in the Slackware -current tree. All users of Slackware 7.0, 7.1, and -current are stronly urged to upgrade to the new tcpip1.tgz package. For users of Slackware 4.0, a wuftpd.tgz patch package is being provided in the /patches tree of Slackware 4.0. ========================================wu-ftpd 2.6.1 AVAILABLE - (n1/tcpip1.tgz) ======================================== FOR USERS OF SLACKWARE 7.0, 7.1, and -current: --------------------------------------------- The recent vulnerability in wu-ftpd can be fixed by upgrading to the new tcpip1.tgz package. This package upgrades the wu-ftpd server to version 2.6.1. You can download it from the -current branch: All users of Slackware 7.0, 7.1, and -current are strongly urged to upgrade to the tcpip1.tgz package to fix the vulnerability in wu-ftpd. For verification purposes, we provide the following checksums: 16-bit "sum" checksum: 45865 995 128-bit MD5 message digest: 2ffec28ac4b9de34d5899f7cd88cc5c3 n1/tcpip1.tgz Installation instructions for the tcpip1.tgz package: If you have downloaded the new tcpip1.tgz package, you should bring the system into runlevel 1 and run upgradepkg on it: # telinit 1 # upgradepkg tcpip1.tgz # telinit 3 FOR USERS OF SLACKWARE 4.0: -------------------------- The recent vulnerability in wu-ftpd can be fixed by installing the wuftpd.tgz patch package. This package upgrades the wu-ftpd server to version 2.6.1. You can download it from the Slackware 4.0 branch: All users of Slackware 4.0 are strongly urged to install the wuftpd.tgz patch package to fix the vulnerability in wu-ftpd. For verification purposes, we provide the following checksums: 16-bit "sum" checksum: 06607 105 128-bit MD5 message digest: 75547b1762d7ff4fad233cd89529ff2c wuftpd.tgz Installation instructions for the wuftpd.tgz package: If you have downloaded the wuftpd.tgz patch package, you should bring the system into runlevel 1 and run installpkg on it: # telinit 1 # installpkg wuftpd.tgz # telinit 3 Remember, it's also a good idea to backup configuration files before upgrading packages.

Installation Instructions

Related News