-----BEGIN PGP SIGNED MESSAGE----- - ------------------------------------------------------------------------ Debian Security Advisory 357-1 [EMAIL PROTECTED] http://www.debian.org/security/ Michael Stone July 31, 2003 http://www.debian.org/security/faq - ------------------------------------------------------------------------
Package : wu-ftpd Vulnerability : buffer overflow Problem type : remote root exploit Debian-specific: no CVE Id(s) : CAN-2003-0466 iSEC Security Research reports that wu-ftpd contains an off-by-one bug in the fb_realpath function which could be exploited by a logged-in user (local or anonymous) to gain root privileges. A demonstration exploit is reportedly available. For the current stable distribution (woody) this problem has been fixed in version 2.6.2-3woody1. For the unstable distribution (sid) an update will be available shortly. We recommend you upgrade your wu-ftpd package immediately. Upgrade instructions - -------------------- wget url will fetch the file for you dpkg -i file.deb will install the referenced file. If you are using the apt-get package manager, use the line for sources.list as given below: apt-get update will update the internal database apt-get upgrade will install corrected packages You may use an automated update by adding the resources from the footer to the proper configuration. Debian 3.0 (stable) - ------------------- Stable was released for alpha, arm, hppa, i386, ia64, m68k, mips, mipsel, powerpc, s390 and sparc. Source archives: http://security.debian.org/pool/updates/main/w/wu-ftpd/wu-ftpd_2.6.2.orig.tar.gz Size/MD5 checksum: 354784 b3c271f02aadf663b8811d1bff9da3f6 http://security.debian.org/pool/updates/main/w/wu-ftpd/wu-ftpd_2.6.2-3woody1.dsc Size/MD5 checksum: 713 0e7285b9fd050b4e8a30aa21d62f44d8 http://security.debian.org/pool/updates/main/w/wu-ftpd/wu-ftpd_2.6.2-3woody1.diff.gz Size/MD5 checksum: 99967 88c990894af29cce4d14ee6822069542 Architecture independent packages: http://security.debian.org/pool/updates/main/w/wu-ftpd/wu-ftpd-academ_2.6.2-3woody1_all.deb Size/MD5 checksum: 3476 79da608623ce421a11c568e97565f537 alpha architecture (DEC Alpha) http://security.debian.org/pool/updates/main/w/wu-ftpd/wu-ftpd_2.6.2-3woody1_alpha.deb Size/MD5 checksum: 291540 20b379bd4495f8d810cc75f4188e0f94 arm architecture (ARM) http://security.debian.org/pool/updates/main/w/wu-ftpd/wu-ftpd_2.6.2-3woody1_arm.deb Size/MD5 checksum: 265158 f5d590b10861f6f355d40d501cf35e75 hppa architecture (HP PA RISC) http://security.debian.org/pool/updates/main/w/wu-ftpd/wu-ftpd_2.6.2-3woody1_hppa.deb Size/MD5 checksum: 275684 4cc9e3eb212401091d4f51ddf54dd771 i386 architecture (Intel ia32) http://security.debian.org/pool/updates/main/w/wu-ftpd/wu-ftpd_2.6.2-3woody1_i386.deb Size/MD5 checksum: 255102 f79202c825c979fafd8de828401a8179 ia64 architecture (Intel ia64) http://security.debian.org/pool/updates/main/w/wu-ftpd/wu-ftpd_2.6.2-3woody1_ia64.deb Size/MD5 checksum: 321168 30d2ce430f8ae75eabf76d9f2427f6cb m68k architecture (Motorola Mc680x0) http://security.debian.org/pool/updates/main/w/wu-ftpd/wu-ftpd_2.6.2-3woody1_m68k.deb Size/MD5 checksum: 249258 79367429ca9b917c99db373c205da8f8 mips architecture (MIPS (Big Endian)) Not yet available. mipsel architecture (MIPS (Little Endian)) http://security.debian.org/pool/updates/main/w/wu-ftpd/wu-ftpd_2.6.2-3woody1_mipsel.deb Size/MD5 checksum: 272916 ec410054275c42450c6eb983cfc3e6e6 powerpc architecture (PowerPC) http://security.debian.org/pool/updates/main/w/wu-ftpd/wu-ftpd_2.6.2-3woody1_powerpc.deb Size/MD5 checksum: 268236 3e1954b334be827bdbbf43edb2336978 s390 architecture (IBM S/390) http://security.debian.org/pool/updates/main/w/wu-ftpd/wu-ftpd_2.6.2-3woody1_s390.deb Size/MD5 checksum: 262914 448c89adf5f1eabfafa9b944719d34ba sparc architecture (Sun SPARC/UltraSPARC) http://security.debian.org/pool/updates/main/w/wu-ftpd/wu-ftpd_2.6.2-3woody1_sparc.deb Size/MD5 checksum: 270306 5d5126fbaf637dffc0224b5a9e402cd1 - ------------------------------------------------------------------------------- For apt-get: deb http://security.debian.org/ stable/updates main For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main Mailing list: [EMAIL PROTECTED] Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg> -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.2 (GNU/Linux) iQCVAwUBPymORg0hVr09l8FJAQFEDwQAv0fIMiermzZcUVlcQO+98bPm0axQIddy Q4RKp4EKZCfIErYqqkq0A4LIl58hzJ12H/56wBBSRlb+/cNcwb/0MTPz0cWhX62X T5pXG3ybGhCOgqnu8rKjPhWf65V0S+knx5hdOItpluGZWmKWQKDHmBrRjl28iyU0 j6QKq4EKzPc= =paUO -----END PGP SIGNATURE----- -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]