Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 9 Sep 1999 06:28:43 -0700
From:      "Ron 'The InSaNe One' Rosson" <insane@lunatic.oneinsane.net>
To:        Bill Fink <bill@billfink.com>
Cc:        freebsd-security@freebsd.org
Subject:   Re: FTP Vulnerability
Message-ID:  <19990909062843.A590@lunatic.oneinsane.net>
In-Reply-To: <51D35DCFD7B0D21189440040333985C0013853@exchange1.billfink.com.247.64.63.IN-ADDR.ARPA>; from Bill Fink on Thu, Sep 09, 1999 at 09:03:01AM -0400
References:  <51D35DCFD7B0D21189440040333985C0013853@exchange1.billfink.com.247.64.63.IN-ADDR.ARPA>

next in thread | previous in thread | raw e-mail | index | archive | help

On Thu, 09 Sep 1999, Bill Fink was heard blurting out:

> 
> 
> I truly apologize, I trust I'm overlooking something here.
> 
> The advisory below states:
> 
> >> Upgrade your wu-ftpd or proftpd 
> >> ports to the most recent versions
> >> (any version after August 30, 1999 
> >> is not impacted by this problem).
> 
> I've visited the mirrors for the WUFTP site(s) looking for the versions
> "after August 30" and there's NOTHING newer than MAY.
> 

Take a look at the patches in the ports tree for these ports and you
will see the changes.

> 
> ============================================================================
> =
> FreeBSD-SA-99:03                                            Security
> Advisory
>                                                                 FreeBSD,
> Inc.
> 
> Topic:          Two ftp daemons in ports vulnerable to attack.
> 
> Category:       ports
> Module:         wu-ftpd and proftpd
> Announced:      1999-09-05
> Affects:        FreeBSD 3.2 (and earlier)
> 		FreeBSD-current before the correction date.
> Corrected:      FreeBSD-3.3 RELEASE
> 		FreeBSD-current as of 1999/08/30
> FreeBSD only:   NO
> 
> Patches:        NONE
> 
> I.   Background    
> 
> wuftpd and proftpd have a flaw which can lead to a remote root
> compromise.  They are both vulnerable since they are both based on a
> code base that is vulnerable.
> 
> II.  Problem Description
> 
> Remote users can gain root via a buffer overflow.
> 
> III. Impact
> 
> Remote users can gain root.
> 
> IV.  Workaround
> 
> Disable the ftp daemon until you can upgrade your system.
> 
> V.   Solution
> 
> Upgrade your wu-ftpd or proftpd ports to the most recent versions (any
> version after August 30, 1999 is not impacted by this problem).  If
> you are running non-port versions, you should verify that your version
> is not vulnerable or upgrade to using the ports version of these
> programs.
> 
> ============================================================================
> =
> FreeBSD, Inc.
> 
> Web Site:                       http://www.freebsd.org/
> Confidential contacts:          security-officer@freebsd.org
> Security notifications:         security-notifications@freebsd.org
> Security public discussion:     freebsd-security@freebsd.org
> PGP Key:
> ftp://ftp.freebsd.org/pub/FreeBSD/CERT/public_key.asc
> 
> Notice: Any patches in this document may not apply cleanly due to
>         modifications caused by digital signature or mailer software.
>         Please reference the URL listed at the top of this document
>         for original copies of all patches if necessary.
> ============================================================================
> =
> 
> 
> 
> To Unsubscribe: send mail to majordomo@FreeBSD.org
> with "unsubscribe freebsd-security" in the body of the message
> 
> 
> 
> 
> To Unsubscribe: send mail to majordomo@FreeBSD.org
> with "unsubscribe freebsd-security" in the body of the message

-- 
-------------------------------------------------------------------
Ron Rosson              	... and a UNIX user said ...
The InSaNe One                 		   rm -rf *
insane@oneinsane.net      	and all was null and void
-------------------------------------------------------------------
Practice random acts of intelligence and senseless acts of self-control.


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?19990909062843.A590>