[SECURITY] [DSA-055-1] gftp remote exploit

From: debian-security-announceat_private
Date: Tue May 08 2001 - 07:11:31 PDT

  • Next message: marvinat_private: "Re: Fun with IP Identification Field Values (Identifying Older MS Based OSs)"

    -----BEGIN PGP SIGNED MESSAGE-----
    
    - ------------------------------------------------------------------------
    Debian Security Advisory DSA-055-1                   securityat_private
    http://www.debian.org/security/                         Wichert Akkerman
    May  8, 2001
    - ------------------------------------------------------------------------
    
    
    Package        : gftp
    Problem type   : printf format attack
    Debian-specific: no
    
    The gftp package as distributed with Debian GNU/Linux 2.2 has a problem
    in its logging code: it logged data received from the network but it did
    not protect itself from printf format attacks. An attacker can use this
    by making a FTP server return special responses that exploit this.
    
    This has been fixed in version 2.0.6a-3.1, and we recommend that you
    upgrade your gftp package.
    
    
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    
    
    Debian GNU/Linux 2.2 alias potato
    - ---------------------------------
    
      Potato was released for alpha, arm, i386, m68k, powerpc and sparc.
    
      Source archives:
        http://security.debian.org/dists/stable/updates/main/source/gftp_2.0.6a-3.1.diff.gz
          MD5 checksum: 23df5107a21eaa36b3dcc50367bd3b46
        http://security.debian.org/dists/stable/updates/main/source/gftp_2.0.6a-3.1.dsc
          MD5 checksum: b99704d17c10b1f2bbbb80d430b55d21
        http://security.debian.org/dists/stable/updates/main/source/gftp_2.0.6a.orig.tar.gz
          MD5 checksum: 8eba39ab947712b46756b4e014b72e8c
    
      Alpha architecture:
        http://security.debian.org/dists/stable/updates/main/binary-alpha/gftp_2.0.6a-3.1_alpha.deb
          MD5 checksum: 7df9efccb67296eb2df1e070e66add80
    
      ARM architecture:
        http://security.debian.org/dists/stable/updates/main/binary-arm/gftp_2.0.6a-3.1_arm.deb
          MD5 checksum: 2d701b8c6c4f5e05ca8664a65cf2e8d3
    
      Intel ia32 architecture:
        http://security.debian.org/dists/stable/updates/main/binary-i386/gftp_2.0.6a-3.1_i386.deb
          MD5 checksum: 71b547eec5c5e24f9dca56882b5fbf8a
    
      Motorola 680x0 architecture:
        http://security.debian.org/dists/stable/updates/main/binary-m68k/gftp_2.0.6a-3.1_m68k.deb
          MD5 checksum: 4f824249dd40ed70ba3f373cbad1a790
    
      PowerPC architecture:
        http://security.debian.org/dists/stable/updates/main/binary-powerpc/gftp_2.0.6a-3.1_powerpc.deb
          MD5 checksum: 12d5e7b0b433d9eeefef48c31786ee83
    
      Sun Sparc architecture:
        http://security.debian.org/dists/stable/updates/main/binary-sparc/gftp_2.0.6a-3.1_sparc.deb
          MD5 checksum: c0de4c7a87d2dbb153bc6a67530ac0cc
    
      These packages will be moved into the stable distribution on its next
      revision.
    
    For not yet released architectures please refer to the appropriate
    directory ftp://ftp.debian.org/debian/dists/sid/binary-$arch/ .
    
    - --
    - ----------------------------------------------------------------------------
    apt-get: deb http://security.debian.org/ stable/updates main
    dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
    Mailing list: debian-security-announceat_private
    
    -----BEGIN PGP SIGNATURE-----
    Version: 2.6.3ia
    Charset: noconv
    
    iQB1AwUBOvf6yqjZR/ntlUftAQHTgwMArHoh8VLWNq5qhnuMu8R+PvIG5lk4HIu0
    IszAShUmoQsOWhVLfXtnyHZO5+ljRHixnxfS5P7A8aAhYi15i9ZvVSXGtjeOEp3m
    l6ZTypVhKvNPW/fuZzpLIVvA9bgj06nr
    =Iym9
    -----END PGP SIGNATURE-----
    
    
    --
    To UNSUBSCRIBE, email to debian-security-announce-requestat_private
    with a subject of "unsubscribe". Trouble? Contact listmasterat_private
    



    This archive was generated by hypermail 2b30 : Thu May 10 2001 - 23:54:46 PDT