Login
Newsletter
Werbung

Sicherheit: Pufferüberlauf und unsichere Verwendung von /tmp in wu-ftpd (Aktualisierung)
Aktuelle Meldungen Distributionen
Name: Pufferüberlauf und unsichere Verwendung von /tmp in wu-ftpd (Aktualisierung)
ID: DSA-016-3
Distribution: Debian
Plattformen: Debian potato
Datum: Mi, 24. Januar 2001, 12:00
Referenzen: Keine Angabe
Applikationen: WU-FTPD
Update von: Pufferüberlauf und unsichere Verwendung von /tmp in wu-ftpd

Originalnachricht

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

----------------------------------------------------------------------------
Debian Security Advisory DSA-016-3 security@debian.org
http://www.debian.org/security/ Martin Schulze
January 24, 2001
----------------------------------------------------------------------------

Package : wu-ftpd
Vulnerability : temp file creation and format string
Debian-specific: no

Security people at WireX have noticed a temp file creation bug and the
WU-FTPD development team has found a possible format string bug in
wu-ftpd. Both could be remotely exploited, though no such exploit
exists currently.

This additional advisory only announces a recompile of the package for
the Intel ia32 architecture. The upload from yesterday was lacking
PAM support. This only required a recompile and contains no other
fixes. (Sorry, but when I make a mistake, I have to make it real,
this time it's the correct file).

For upgrading please use

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

Or use an automated update by adding the resources from the footer to
the proper configuration.


Debian GNU/Linux 2.2 alias potato
------------------------------------

Intel ia32 architecture:

wu-ftpd_2.6.0-5.2.1_i386.deb
MD5 checksum: e0521153d6c9c23082edb29cc8d03fd3

These files will be moved into
ftp://ftp.debian.org/debian/dists/stable/*/binary-$arch/ soon.


----------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-securitydists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.4 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iD8DBQE6bn2HW5ql+IAeqTIRAlxRAJ9JIj0KvmI1mnY19lnUICUjzce8vwCfQMvS
rwEZYHHmhMiSVU1+4BdCwKA=
=JJUl
-----END PGP SIGNATURE-----


--
To UNSUBSCRIBE, email to debian-security-announce-request@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact
listmaster@lists.debian.org
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung