[LWN Logo]
[LWN.net]
From:	 Wichert Akkerman <wichert@cistron.nl>
To:	 debian-security-announce@lists.debian.org
Subject: [SECURITY] [DSA-055-1] gftp remote exploit
Date:	 Tue, 8 May 2001 15:55:24 +0200

-----BEGIN PGP SIGNED MESSAGE-----

- ------------------------------------------------------------------------
Debian Security Advisory DSA-055-1                   security@debian.org
http://www.debian.org/security/                         Wichert Akkerman
May  8, 2001
- ------------------------------------------------------------------------


Package        : gftp
Problem type   : printf format attack
Debian-specific: no

The gftp package as distributed with Debian GNU/Linux 2.2 has a problem
in its logging code: it logged data received from the network but it did
not protect itself from printf format attacks. An attacker can use this
by making a FTP server return special responses that exploit this.

This has been fixed in version 2.0.6a-3.1, and we recommend that you
upgrade your gftp package.


wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.


Debian GNU/Linux 2.2 alias potato
- ---------------------------------

  Potato was released for alpha, arm, i386, m68k, powerpc and sparc.

  Source archives:
    http://security.debian.org/dists/stable/updates/main/source/gftp_2.0.6a-3.1.diff.gz
      MD5 checksum: 23df5107a21eaa36b3dcc50367bd3b46
    http://security.debian.org/dists/stable/updates/main/source/gftp_2.0.6a-3.1.dsc
      MD5 checksum: b99704d17c10b1f2bbbb80d430b55d21
    http://security.debian.org/dists/stable/updates/main/source/gftp_2.0.6a.orig.tar.gz
      MD5 checksum: 8eba39ab947712b46756b4e014b72e8c

  Alpha architecture:
    http://security.debian.org/dists/stable/updates/main/binary-alpha/gftp_2.0.6a-3.1_alpha.deb
      MD5 checksum: 7df9efccb67296eb2df1e070e66add80

  ARM architecture:
    http://security.debian.org/dists/stable/updates/main/binary-arm/gftp_2.0.6a-3.1_arm.deb
      MD5 checksum: 2d701b8c6c4f5e05ca8664a65cf2e8d3

  Intel ia32 architecture:
    http://security.debian.org/dists/stable/updates/main/binary-i386/gftp_2.0.6a-3.1_i386.deb
      MD5 checksum: 71b547eec5c5e24f9dca56882b5fbf8a

  Motorola 680x0 architecture:
    http://security.debian.org/dists/stable/updates/main/binary-m68k/gftp_2.0.6a-3.1_m68k.deb
      MD5 checksum: 4f824249dd40ed70ba3f373cbad1a790

  PowerPC architecture:
    http://security.debian.org/dists/stable/updates/main/binary-powerpc/gftp_2.0.6a-3.1_powerpc.deb
      MD5 checksum: 12d5e7b0b433d9eeefef48c31786ee83

  Sun Sparc architecture:
    http://security.debian.org/dists/stable/updates/main/binary-sparc/gftp_2.0.6a-3.1_sparc.deb
      MD5 checksum: c0de4c7a87d2dbb153bc6a67530ac0cc

  These packages will be moved into the stable distribution on its next
  revision.

For not yet released architectures please refer to the appropriate
directory ftp://ftp.debian.org/debian/dists/sid/binary-$arch/ .

- -- 
- ----------------------------------------------------------------------------
apt-get: deb http://security.debian.org/ stable/updates main
dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3ia
Charset: noconv

iQB1AwUBOvf6yqjZR/ntlUftAQHTgwMArHoh8VLWNq5qhnuMu8R+PvIG5lk4HIu0
IszAShUmoQsOWhVLfXtnyHZO5+ljRHixnxfS5P7A8aAhYi15i9ZvVSXGtjeOEp3m
l6ZTypVhKvNPW/fuZzpLIVvA9bgj06nr
=Iym9
-----END PGP SIGNATURE-----


--  
To UNSUBSCRIBE, email to debian-security-announce-request@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org