[SECURITY] New versions of proftpd fixes buffer overflow

From: debian-security-announceat_private
Date: Thu Feb 11 1999 - 17:12:04 PST

  • Next message: Josh Bailey: "Re: Security problems in ISDN equipment authentication"

    -----BEGIN PGP SIGNED MESSAGE-----
    
    We have received reports that the proftpd package as distributed
    in Debian GNU/Linux 2.0 is vulnerable to a buffer overflow. Using this
    vulnerability, known as palmetto, it is possible to gain shell access or
    otherwise circumvent normal login access and logging mechanisms.
    
    This has been fixed in version 1.2.0pre1-2
    
    We recommend you upgrade your proftpd package immediately.
    
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    
    Debian GNU/Linux 2.0 alias hamm
    - -------------------------------
    
      This version of Debian was released only for the Intel and the
      Motorola 680x0 architecture.
    
      Source archives:
        ftp://ftp.debian.org/debian/dists/proposed-updates/proftpd_1.2.0pre1.orig.tar.gz
    	  MD5 checksum: 40695cf2ce6a7ff70e36e2c4d140a50e
        ftp://ftp.debian.org/debian/dists/proposed-updates/proftpd_1.2.0pre1-2.diff.gz
          MD5 checksum: b9709fc768ba863bef08729325a9c53a
        ftp://ftp.debian.org/debian/dists/proposed-updates/proftpd_1.2.0pre1-2.dsc
          MD5 checksum: a2245a4681873caad9dd83002e653bb0
    
      Intel architecture:
        ftp://ftp.debian.org/debian/dists/proposed-updates/proftpd_1.2.0pre1-2_i386.deb
          MD5 checksum: 6fa9921e694972015d4e3d34184c4f2b
    
      Motorola 680x0 architecture:
        ftp://ftp.debian.org/debian/dists/proposed-updates/proftpd_1.2.0pre1-2_m68k.
          MD5 checksum: 52053f8b9f348ff1929db91951cf394f
    
    
      These files will be moved into
      ftp://ftp.debian.org/debian/dists/hamm/*/binary-$arch/ soon.
    
    
    For not yet released architectures please refer to the appropriate
    directory ftp://ftp.debian.org/debian/dists/sid/binary-$arch/ .
    
    - --
    Debian GNU/Linux      .    Security Managers     .   securityat_private
                  debian-security-announceat_private
      Christian Hudon     .     Wichert Akkerman     .     Martin Schulze
    <chrishat_private>   .   <wakkermaat_private>  .   <joeyat_private>
    
    -----BEGIN PGP SIGNATURE-----
    Version: 2.6.3ia
    Charset: noconv
    
    iQB1AwUBNsNh4qjZR/ntlUftAQF9aAMAqyjBrarrOWFPeEGFziipnsv2ycG8kHZv
    iczaGOtJdO11zewN3Qj3y4+K0cke67uVjw92asRvVTzeRlmh8xmar+cp04vYA96p
    BfI7zd/kRmpNV+35Xq0wWKPxU4iUVkSU
    =EPwU
    -----END PGP SIGNATURE-----
    
    
    --
    To UNSUBSCRIBE, email to debian-security-announce-requestat_private
    with a subject of "unsubscribe". Trouble? Contact listmasterat_private
    



    This archive was generated by hypermail 2b30 : Fri Apr 13 2001 - 14:33:52 PDT