drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mehrere Probleme in proftpd
Name: |
Mehrere Probleme in proftpd |
|
ID: |
SSA:2006-335-02 |
|
Distribution: |
Slackware |
|
Plattformen: |
Slackware 8.1, Slackware 9.0, Slackware 9.1, Slackware 10.0, Slackware 10.1, Slackware 10.2, Slackware 11.0 |
|
Datum: |
Sa, 2. Dezember 2006, 00:16 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5815
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6170
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6171 |
|
Applikationen: |
ProFTPD |
|
Originalnachricht |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
[slackware-security] proftpd (SSA:2006-335-02)
New proftpd packages are available for Slackware 8.1, 9.0, 9.1, 10.0, 10.1, 10.2, and 11.0 to fix security issues.
More details about this issue may be found in the Common Vulnerabilities and Exposures (CVE) database:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5815 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6170 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6171
Here are the details from the Slackware 11.0 ChangeLog: +--------------------------+ patches/packages/proftpd-1.3.0a-i486-1_slack11.0.tgz: Upgraded to proftpd-1.3.0a plus an additional security patch. Several security issues were found in proftpd that could lead to the execution of arbitrary code by a remote attacker, including one in mod_tls that does not require the attacker to be authenticated first. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5815 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6170 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6171 (* Security fix *) +--------------------------+
Where to find the new packages: +-----------------------------+
HINT: Getting slow download speeds from ftp.slackware.com? Give slackware.osuosl.org a try. This is another primary FTP site for Slackware that can be considerably faster than downloading from ftp.slackware.com.
Thanks to the friendly folks at the OSU Open Source Lab (http://osuosl.org) for donating additional FTP and rsync hosting to the Slackware project! :-)
Also see the "Get Slack" section on http://slackware.com for additional mirror sites near you.
Updated package for Slackware 8.1: proftpd-1.3.0a-i386-1_slack8.1.tgz
Updated package for Slackware 9.0: proftpd-1.3.0a-i386-1_slack9.0.tgz
Updated package for Slackware 9.1: proftpd-1.3.0a-i486-1_slack9.1.tgz
Updated package for Slackware 10.0: proftpd-1.3.0a-i486-1_slack10.0.tgz
Updated package for Slackware 10.1: proftpd-1.3.0a-i486-1_slack10.1.tgz
Updated package for Slackware 10.2: proftpd-1.3.0a-i486-1_slack10.2.tgz
Updated package for Slackware 11.0: proftpd-1.3.0a-i486-1_slack11.0.tgz
MD5 signatures: +-------------+
Slackware 8.1 package: 74e7540bd3a29270b6192e470a456b45 proftpd-1.3.0a-i386-1_slack8.1.tgz
Slackware 9.0 package: 50ad4d2161afb3e8f215cb6355d5960c proftpd-1.3.0a-i386-1_slack9.0.tgz
Slackware 9.1 package: 4264ec744b7e964ec8ba659a038edc77 proftpd-1.3.0a-i486-1_slack9.1.tgz
Slackware 10.0 package: 58ab727acfaba50b1acb16d49d02570b proftpd-1.3.0a-i486-1_slack10.0.tgz
Slackware 10.1 package: 4d4560f63398633cdcfe4dda9b9c39da proftpd-1.3.0a-i486-1_slack10.1.tgz
Slackware 10.2 package: 8253edd497dc19bef0d6b215dc9e4e34 proftpd-1.3.0a-i486-1_slack10.2.tgz
Slackware 11.0 package: 6964fa68393b79c0d1493843a709f339 proftpd-1.3.0a-i486-1_slack11.0.tgz
Installation instructions: +------------------------+
Upgrade the package as root: # upgradepkg proftpd-1.3.0a-i486-1_slack11.0.tgz
+-----+
Slackware Linux Security Team http://slackware.com/gpg-key security@slackware.com
+------------------------------------------------------------------------+ | To leave the slackware-security mailing list: | +------------------------------------------------------------------------+ | Send an email to majordomo@slackware.com with this text in the body of | | the email message: | | | | unsubscribe slackware-security | | | | You will get a confirmation message back containing instructions to | | complete the process. Please do not reply to this email address. | +------------------------------------------------------------------------+ -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.7 (GNU/Linux)
iD8DBQFFcJtcakRjwEAQIjMRAo3ZAJsGetn+zmAIHHmEbi3BL4uncvuYWgCgjkip KatXdKdjDKa/iUotydCefjo= =x+jK -----END PGP SIGNATURE-----
|
|
|
|