From:	 Immunix Security Team <security@wirex.com>
To:	 bugtraq@securityfocus.com, linsec@lists.seifried.org,
	 immunix-announce@immunix.org, security-alerts@linuxsecurity.com
Subject: Immunix 7.0 wu-ftpd format string bug
Date:	 Thu, 29 Nov 2001 17:18:19 -0800

-----------------------------------------------------------------------
	Immunix OS Security Advisory

Packages updated:	wu-ftpd
Affected products:	Immunix 7.0
Bugs fixed:		immunix/1865
Date:			Thu Nov 29 2001
Advisory ID:		IMNX-2001-70-036-02
Author:			Seth Arnold <sarnold@wirex.com>
-----------------------------------------------------------------------

Description:
  This is a re-release of wu-ftpd. New patches are available today that
  fix several format string problems, believed to be not exploitable.
  There is also a null-pointer dereference check added in several
  places, also believed to be not exploitable.

  As such, we believe this to be a reliability update only in comparison
  to the update in advisory IMNX-2001-70-036-01 -- however, the bug in
  yesterday's advisory was at one time believed to be not exploitable as
  well. As such, installing this update is a good idea, but not critical
  at this point.

  It cannot be stressed enough that at least one of IMNX-2001-70-036-01
  or IMNX-2001-70-036-02 must be applied quickly; it is rumored this
  flaw is being actively exploited.

  References:
  http://www.securityfocus.com/archive/1/242750
  http://www.securityfocus.com/archive/1/242964

Package names and locations:
  Precompiled binary packages for Immunix 7.0 are available at:
http://download.immunix.org/ImmunixOS/7.0/updates/RPMS/wu-ftpd-2.6.1-6_imnx_5.i386.rpm

  Source package for Immunix 7.0 is available at:
http://download.immunix.org/ImmunixOS/7.0/updates/SRPMS/wu-ftpd-2.6.1-6_imnx_5.src.rpm

Immunix OS 7.0 md5sums:
  f3e1b292c522b9b1fd5f813d60bf7e9c  RPMS/wu-ftpd-2.6.1-6_imnx_5.i386.rpm
  54c7c7eabcb31624664cb4907747ed0c  SRPMS/wu-ftpd-2.6.1-6_imnx_5.src.rpm

GPG verification:                                                               
  Our public key is available at <http://wirex.com/security/GPG_KEY>.           
  *** NOTE *** This key is different from the one used in advisories            
  IMNX-2001-70-020-01 and earlier.

Online version of all Immunix 6.2 updates and advisories:
  http://immunix.org/ImmunixOS/6.2/updates/

Online version of all Immunix 7.0-beta updates and advisories:
  http://immunix.org/ImmunixOS/7.0-beta/updates/

Online version of all Immunix 7.0 updates and advisories:
  http://immunix.org/ImmunixOS/7.0/updates/

NOTE:
  Ibiblio is graciously mirroring our updates, so if the links above are
  slow, please try:
    ftp://ftp.ibiblio.org/pub/Linux/distributions/immunix/
  or one of the many mirrors available at:
    http://www.ibiblio.org/pub/Linux/MIRRORS.html

  ImmunixOS 6.2 is no longer officially supported.

Contact information:
  To report vulnerabilities, please contact security@wirex.com. WireX 
  attempts to conform to the RFP vulnerability disclosure protocol
  <http://www.wiretrip.net/rfp/policy.html>.