5224318 2000-06-24 00:45 /162 rader/ Postmaster
Mottagare: Bugtraq (import) <11412>
Ärende: Security Update: wu-ftpd vulnerability
------------------------------------------------------------
Approved-By: aleph1@SECURITYFOCUS.COM
Delivered-To: bugtraq@lists.securityfocus.com
Delivered-To: bugtraq@securityfocus.com
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Message-ID: <20000623135118.A28394@phoenix.calderasystems.com>
Date: Fri, 23 Jun 2000 13:51:18 -0600
Reply-To: Technical Support <support@PHOENIX.CALDERASYSTEMS.COM>
Sender: Bugtraq List <BUGTRAQ@SECURITYFOCUS.COM>
From: Technical Support <support@PHOENIX.CALDERASYSTEMS.COM>
X-To: announce@lists.calderasystems.com, inux-security@redhat.com
security-alerts@linuxsecurity.com
To: BUGTRAQ@SECURITYFOCUS.COM
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
______________________________________________________________________________
Caldera Systems, Inc. Security Advisory
Subject: wu-ftpd vulnerability
Advisory number: CSSA-2000-020.0
Issue date: 2000 June, 23
Cross reference:
______________________________________________________________________________
1. Problem Description
There is a problem in wu-ftpd handling of the SITE EXEC command
that allows remote attackers to gain root access.
This attack is possible in the default configuration of the wu-ftpd
we are shipping for all ftp users, including the anonymous user.
We urge our users to upgrade to the fixed version of wu-ftpd.
2. Vulnerable Versions
System Package
-----------------------------------------------------------
OpenLinux Desktop 2.3 All packages previous to
wu-ftpd-2.5.0-7
OpenLinux eServer 2.3 All packages previous to
and OpenLinux eBuilder wu-ftpd-2.5.0-7
OpenLinux eDesktop 2.4 All packages previous to
wu-ftpd-2.5.0-7
3. Solution
Workaround:
If you do not need wu-ftpd, deinstall it running following command
as root:
rpm -e wu-ftpd
The proper solution is to upgrade to the fixed packages.
4. OpenLinux Desktop 2.3
4.1 Location of Fixed Packages
The upgrade packages can be found on Caldera's FTP site at:
ftp://ftp.calderasystems.com/pub/updates/OpenLinux/2.3/current/RPMS/
The corresponding source code package can be found at:
ftp://ftp.calderasystems.com/pub/updates/OpenLinux/2.3/current/SRPMS
4.2 Verification
ddc86702f33d6a5edddab258ddd72195 RPMS/wu-ftpd-2.5.0-7.i386.rpm
8090110ecef8d1efd2fe4c279f209e29 SRPMS/wu-ftpd-2.5.0-7.src.rpm
4.3 Installing Fixed Packages
Upgrade the affected packages with the following commands:
rpm -F wu-ftpd-2.5.0-7.i386.rpm
5. OpenLinux eServer 2.3 and OpenLinux eBuilder for ECential 3.0
5.1 Location of Fixed Packages
The upgrade packages can be found on Caldera's FTP site at:
ftp://ftp.calderasystems.com/pub/updates/eServer/2.3/current/RPMS/
The corresponding source code package can be found at:
ftp://ftp.calderasystems.com/pub/updates/eServer/2.3/current/SRPMS
5.2 Verification
f909e8b47ec6780109c2437cdfdc2497 RPMS/wu-ftpd-2.5.0-7.i386.rpm
8354edf2f90e59aa96d8baf1d77e28a0 SRPMS/wu-ftpd-2.5.0-7.src.rpm
5.3 Installing Fixed Packages
Upgrade the affected packages with the following commands:
rpm -F wu-ftpd-2.5.0-7.i386.rpm
6. OpenLinux eDesktop 2.4
6.1 Location of Fixed Packages
The upgrade packages can be found on Caldera's FTP site at:
ftp://ftp.calderasystems.com/pub/updates/eDesktop/2.4/current/RPMS/
The corresponding source code package can be found at:
ftp://ftp.calderasystems.com/pub/updates/eDesktop/2.4/current/SRPMS
6.2 Verification
d2df4fb386d65387039f33538571d907 RPMS/wu-ftpd-2.5.0-7.i386.rpm
13313d25d6d93dd98dd94e62d48c711c SRPMS/wu-ftpd-2.5.0-7.src.rpm
6.3 Installing Fixed Packages
Upgrade the affected packages with the following commands:
rpm -F wu-ftpd-2.5.0-7.i386.rpm
7. References
This and other Caldera security resources are located at:
http://www.calderasystems.com/support/security/index.html
This security fix closes Caldera's internal Problem Report 6922.
8. Disclaimer
Caldera Systems, Inc. is not responsible for the misuse of any of
the information we provide on this website and/or through our
security advisories. Our advisories are a service to our customers
intended to promote secure installation and use of Caldera
OpenLinux.
9. Acknowledgements
Caldera Systems wishes to thank Daniel Jacobowitz for providing
patches to the problem.
______________________________________________________________________________
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.1 (GNU/Linux)
Comment: For info see http://www.gnupg.org
iD8DBQE5U2un18sy83A/qfwRAhcpAJ472gS3sX8f5zbnl+Efy1C45I02MgCguX5n
HCRGVcjTYIdrbnI0cZxP0xM=
=cRb3
-----END PGP SIGNATURE-----
(5224318) ------------------------------------------(Ombruten)