[LWN Logo]
[Timeline]
Date:         Wed, 19 Jul 2000 17:31:35 -0700
From: Joe Little <jlittle@TURBOLINUX.COM>
Subject:      [TL-Security-Announce] wu-ftpd TLSA2000014-1
To: BUGTRAQ@SECURITYFOCUS.COM

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

___________________________________________________________________________

                        TurboLinux Security Announcement


        Package: wu-ftpd-2.6.0 and earlier
        Date: Wednesday July 19 17:00 PDT 2000

        Affected TurboLinux versions: 4.0 (TCS/TLS) and earlier
        Vulnerability Type: remote root exploit via SITE EXEC
        TurboLinux Advisory ID#:  TLSA2000014-1
	Cert Advisory: CA-2000-13

___________________________________________________________________________

A security hole was discovered in the package mentioned avobe. Please
update the package in your installation as soon as possible or disable the
service.
___________________________________________________________________________

1. Problem Summary

A buffer overrun exists in wu-ftpd versions prior to 2.6.1. Due to improper
bounds checking, SITE EXEC may enable remote root execution, without having
any local user account required.

2. Impact

An attacker can use this exploit to remotely execute code on the machine
where wu-ftpd is being used.  This could easily lead to a remote root
compromise.

3. Solution

Update the package from our ftp server by running the following command:

rpm -Fv ftp_path_to_filename

Where ftp_path_to_filename is the following:

ftp://ftp.turbolinux.com/pub/updates/4.0/security/wu-ftpd-2.6.1-1.i386.rpm

The source RPM can be downloaded here:

ftp://ftp.turbolinux.com/pub/updates/4.0/SRPMS/wu-ftpd-2.6.1-1.src.rpm

  **Note: You must rebuild and install the RPM if you choose to download
  and install the SRPM.  Simply installing the SRPM alone WILL NOT CLOSE
  THE SECURITY HOLE.

Please verify the MD5 checksum of the update before you install:

  MD5 sum                               Package Name
- ---------------------------------------------------------------------------
0052bd2cd2e7f1fa1abadc5b2dd63a12  wu-ftpd-2.6.1-1.i386.rpm
3c914377251bba7bda0f34358e6a4576  wu-ftpd-2.6.1-1.src.rpm
___________________________________________________________________________

These packages are GPG signed by Turbolinux for security. Our key
is available here:

 http://www.turbolinux.com/security/tlgpgkey.asc

To verify a package, use the following command:

 rpm --checksig name_of_rpm

To examine only the md5sum, use the following command:

 rpm --checksig --nogpg name_of_rpm

**Note: Checking GPG keys requires RPM 3.0 or higher.

___________________________________________________________________________
You can find more updates on our ftp server:

   ftp://ftp.turbolinux.com/pub/updates/6.0/security/ for TL6.0 Workstation
   and Server security updates
   ftp://ftp.turbolinux.com/pub/updates/4.0/security/ for TL4.0 Workstation
   and Server security updates

Our webpage for security announcements:

   http://www.turbolinux.com/security

If you want to report vulnerabilities, please contact:

   rt-security@turbolinux.com
___________________________________________________________________________

Subscribe to the TurboLinux Security Mailing lists:

  TL-security - A moderated list for discussing security issues in TurboLinux
  products.
  Subscribe at http://www.turbolinux.com/mailman/listinfo/tl-security

  TL-security-announce - An announce-only mailing list for security updates
  and alerts.
  Subscribe at http://www.turbolinux.com/mailman/listinfo/tl-security-announce

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.2 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iD8DBQE5dkd37eR7bnHQKeQRAumrAJ9Qyf7h1pWmIy3N91ALB6bymVekKQCdEoDT
73goehL00RO8i2f77btL5+c=
=Zltp
-----END PGP SIGNATURE-----



_______________________________________________
TL-Security-Announce mailing list
TL-Security-Announce@www.turbolinux.com
http://www.turbolinux.com/mailman/listinfo/tl-security-announce