Denial of Service in oftpd
ID: | 200701-09 |
Distribution: | Gentoo |
Plattformen: | Keine Angabe |
Datum: | Di, 16. Januar 2007, 00:00 |
Referenzen: | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6767 |
Applikationen: | oftpd |
Originalnachricht |
|
--5/uDoXvLw7AC5HRs Content-Type: text/plain; charset=us-ascii Content-Disposition: inline - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200701-09 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: oftpd: Denial of Service Date: January 15, 2007 Bugs: #159178 ID: 200701-09 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== An assertion in oftpd could lead to a denial of service vulnerability. Background ========== oftpd is a small, anonymous only ftp daemon. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 net-ftp/oftpd < 0.3.7-r3 >= 0.3.7-r3 Description =========== By specifying an unsupported address family in the arguments to a LPRT or LPASV command, an assertion in oftpd will cause the daemon to abort. Impact ====== Remote, unauthenticated attackers may be able to terminate any oftpd process, denying service to legitimate users. Workaround ========== There is no known workaround at this time. Resolution ========== All oftpd users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=net-ftp/oftpd-0.3.7-r3" References ========== [ 1 ] CVE-2006-6767 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6767 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-200701-09.xml Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at http://bugs.gentoo.org. License ======= Copyright 2007 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5 --5/uDoXvLw7AC5HRs Content-Type: application/pgp-signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.6 (GNU/Linux) iQEVAwUBRawGmDvRww8BFPxFAQKhzAf/f20L6mT3O3LIqjSPPj9MVPb3Xjh8MPLa d8o0PUYeRkucyBhWP1SOVNM3VcxTL1N13N8T5u6Gb6hLxJHqB5mFRuJkQPGjgoSt 48OVYXBa7WLDwcC/vo0OQ8GOJ7JonA3Ij/g3a9ZuK3+qw9rpzsW0O9IPOZjcJH82 MktvUxzkmrxIwAyYVRqkNp7Tx1DY1q0GZHMy9BJ9U/r8s/m0Tw/PBd0syl4Tc+mH 1UN1G6iWnqF6OFxjFsYQRQfRgcDiMekv/TutGSkX6HshXa7eDYe8ElxYxPAKAg6/ 0zqgn50ss0G+L1iqjR+MfZDv4DkeLzuSMUIV045JFNCxgMsYstBdNQ== =yUjK -----END PGP SIGNATURE----- --5/uDoXvLw7AC5HRs-- -- gentoo-announce@gentoo.org mailing list |