MDKSA-2003:080 - Updated wu-ftpd packages fix remote root vulnerability

From: Mandrake Linux Security Team (security@linux-mandrake.com)
Date: Thu Jul 31 2003 - 10:35:57 PDT

  • Next message: mteshome: "RE: wu-ftpd fb_realpath() off-by-one bug"

    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1
    
    ________________________________________________________________________
    
                    Mandrake Linux Security Update Advisory
    ________________________________________________________________________
    
    Package name:           wu-ftpd
    Advisory ID:            MDKSA-2003:080
    Date:                   July 31st, 2003
    
    Affected versions:	8.2
    ________________________________________________________________________
    
    Problem Description:
    
     A vulnerability was discovered by Janusz Niewiadomski and Wojciech
     Purczynski in the wu-ftpd FTP server package.  They found an off-by-
     one bug in the fb_realpath() function which could be used by a
     remote attacker to obtain root privileges on the server.  This bug
     can only be successfully accomplished by using wu-ftpd binaries
     compiled on Linux 2.0.x and later 2.4.x kernels because the 2.2.x
     and earlier 2.4.x kernels define PATH_MAX to be 4095 characters.
     
     wu-ftpd is no longer shipped with Mandrake Linux, however Mandrake
     Linux 8.2 did come with wu-ftpd.  If you use wu-ftpd, you are
     encouraged to upgrade to these patched packages.
    ________________________________________________________________________
    
    References:
      
      http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0466
    ________________________________________________________________________
    
    Updated Packages:
      
     Mandrake Linux 8.2:
     77260fab82a32fd204e29160c11f1e30  8.2/RPMS/wu-ftpd-2.6.2-1.1mdk.i586.rpm
     3fd974bd1e718accf048e489dbd52d55  8.2/SRPMS/wu-ftpd-2.6.2-1.1mdk.src.rpm
    
     Mandrake Linux 8.2/PPC:
     283cf3a7797ca19c8e83ae22c0415fd5  ppc/8.2/RPMS/wu-ftpd-2.6.2-1.1mdk.ppc.rpm
     3fd974bd1e718accf048e489dbd52d55  ppc/8.2/SRPMS/wu-ftpd-2.6.2-1.1mdk.src.rpm
    ________________________________________________________________________
    
    Bug IDs fixed (see https://qa.mandrakesoft.com for more information):
    ________________________________________________________________________
    
    To upgrade automatically, use MandrakeUpdate or urpmi.  The verification
    of md5 checksums and GPG signatures is performed automatically for you.
    
    A list of FTP mirrors can be obtained from:
    
      http://www.mandrakesecure.net/en/ftp.php
    
    All packages are signed by MandrakeSoft for security.  You can obtain
    the GPG public key of the Mandrake Linux Security Team by executing:
    
      gpg --recv-keys --keyserver www.mandrakesecure.net 0x22458A98
    
    Please be aware that sometimes it takes the mirrors a few hours to
    update.
    
    You can view other update advisories for Mandrake Linux at:
    
      http://www.mandrakesecure.net/en/advisories/
    
    MandrakeSoft has several security-related mailing list services that
    anyone can subscribe to.  Information on these lists can be obtained by
    visiting:
    
      http://www.mandrakesecure.net/en/mlist.php
    
    If you want to report vulnerabilities, please contact
    
      security_linux-mandrake.com
    
    Type Bits/KeyID     Date       User ID
    pub  1024D/22458A98 2000-07-10 Linux Mandrake Security Team
      <security linux-mandrake.com>
    -----BEGIN PGP SIGNATURE-----
    Version: GnuPG v1.0.7 (GNU/Linux)
    
    iD8DBQE/KVN9mqjQ0CJFipgRAuhHAJ9RGbLx5JSTCIB1tKQxMmyPfpZG0wCgqfAj
    Kf14hy1ny9KhUFgyCW7Eweg=
    =0uKA
    -----END PGP SIGNATURE-----
    



    This archive was generated by hypermail 2b30 : Thu Jul 31 2003 - 11:30:35 PDT