Debian alert: New version of wu-ftpd released

Posted by dave on Jan 22, 2001 11:50 PM EDT
Mailing list
Mail this story
Print this story

Security people at WireX have noticed a temp file creation bug and the WU-FTPD development team has found a possible format string bug in wu-ftpd. Both could be remotely exploited, though no such exploit exists currently.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ----------------------------------------------------------------------------
Debian Security Advisory DSA-016-1                       security@debian.org
http://www.debian.org/security/                               Martin Schulze
January 23, 2001
- ----------------------------------------------------------------------------

Package        : wu-ftpd
Vulnerability  : temp file creation and format string
Debian-specific: no

Security people at WireX have noticed a temp file creation bug and the
WU-FTPD development team has found a possible format string bug in
wu-ftpd.  Both could be remotely exploited, though no such exploit
exists currently.

We recommend you upgrade your wu-ftpd package immediately.

wget url
	will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 2.2 alias potato
- ------------------------------------

  Potato was released for the alpha, arm, i386, m68k, powerpc and sparc
  architectures.

  Source archives:

    http://security.debian.org/dists/stable/updates/main/source/wu-ftpd_2.6.0.orig.tar.gz
      MD5 checksum: 652cfe4b59e0468eded736e7c281d16f
    http://security.debian.org/dists/stable/updates/main/source/wu-ftpd_2.6.0-5.2.dsc
      MD5 checksum: a63f505372cbd5c3d2e0404f7f18576f
    http://security.debian.org/dists/stable/updates/main/source/wu-ftpd_2.6.0-5.2.diff.gz
      MD5 checksum: af6e196640d429f400810aaf016d144c

  Intel ia32 architecture:

    http://security.debian.org/dists/stable/updates/main/binary-i386/wu-ftpd_2.6.0-5.2_i386.deb
      MD5 checksum: 5cdd2172e1b2459f1115cf034c91fe40

  Motorola 680x0 architecture:

    http://security.debian.org/dists/stable/updates/main/binary-m68k/wu-ftpd_2.6.0-5.2_m68k.deb
      MD5 checksum: 60192b7386401ddbbb4ada8776e887ec

  Sun Sparc architecture:

    http://security.debian.org/dists/stable/updates/main/binary-sparc/wu-ftpd_2.6.0-5.2_sparc.deb
      MD5 checksum: 4e7a1c8eb667f3ef40b858ca7833bc14

  Alpha architecture:

    http://security.debian.org/dists/stable/updates/main/binary-alpha/wu-ftpd_2.6.0-5.2_alpha.deb
      MD5 checksum: f5bf5286952e8812b94a692efe6308e0

  PowerPC architecture:

    http://security.debian.org/dists/stable/updates/main/binary-powerpc/wu-ftpd_2.6.0-5.2_powerpc.deb
      MD5 checksum: 15683a1a12381aa5c9b15b108fe6a579

  ARM architecture:

    http://security.debian.org/dists/stable/updates/main/binary-arm/wu-ftpd_2.6.0-5.2_arm.deb
      MD5 checksum: 0d32fa96a7eb8d42dd0216876c894335

  Architecture independent:

    http://security.debian.org/dists/stable/updates/main/binary-all/wu-ftpd-academ_2.6.0-5.2_all.deb
      MD5 checksum: 6974913b3783fedff98e65341e0464be


  These files will be moved into
  ftp://ftp.debian.org/debian/dists/stable/*/binary-$arch/ soon.

For not yet released architectures please refer to the appropriate
directory ftp://ftp.debian.org/debian/dists/sid/binary-$arch/ .

- ----------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.4 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iD8DBQE6bUWKW5ql+IAeqTIRAiyXAJsFm4pH5WOLkwHHsdnwcgqhiJ3vogCgqQc4
mNOMiBp9ZkOLs/0nGJKXZmw=
=xAYD
-----END PGP SIGNATURE-----


  Nav
» Read more about: Story Type: Security; Groups: Debian

« Return to the newswire homepage

This topic does not have any threads posted yet!

You cannot post until you login.