SA-1997.27.txt
62c22c14737981ea6214b6c63c8aa49ffd5242b8049f9ebc22231e81f96e2927
-----BEGIN PGP SIGNED MESSAGE-----
Subject: Caldera Security Advisory SA-1997.27: Vulnerability in wu-ftpd
Caldera Security Advisory SA-1997.27
Original report date: 25-Sep-1997
RPM build date: 19-Nov-1997
Advisory issue date: 26-Nov-1997
Topic: Vulnerability in the wu-ftpd package
I. Problem Description
A vulnerability exists within WU-FTPD that allows a denial of service
attack. Arbitrary individuals can shut down the FTP server.
II. Impact
On systems such as Caldera OpenLinux 1.1, an unprivileged
user connecting to the FTP server can send it a command that
will consume considerable CPU and memory resources. Doing so on
several FTP sessions simultaneously can drive up the system load
to a point where the machine becomes unusable.
This problem was present on the following OpenLinux releases:
Base 1.0
Lite 1.1
Base 1.1
Standard 1.1
To determine if you are affected and need this update you may do
the following:
rpm -q wu-ftpd
If the results show wu-ftpd-2.4.2b12-3 or earlier then you will need
to update.
III. Solution
The proper solution is to install the new wu-ftpd package.
This package is located on Caldera's FTP server (ftp.caldera.com):
The binary RPM can be obtained at:
ftp://ftp.caldera.com/pub/openlinux/updates/1.1/current/RPMS
The source RPM can be obtained at:
ftp://ftp.caldera.com/pub/openlinux/updates/1.1/current/SRPMS
All that is required to do to install the fix is the following:
rpm -U wu-ftpd-2.4.2b15-4.i386.rpm
The MD5 checksums (from the "md5sum" command) for these packages are:
71ffc9f6e22496597ee4be7f998998af wu-ftpd-2.4.2b15-4.i386.rpm
4874b109bbeb6a73112bb9822de6b48d wu-ftpd-2.4.2b15-4.src.rpm
IV. References
This and other Caldera security resources are located at:
http://www.caldera.com/tech-ref/security/
This advisory is based on message posted to the Bugtraq Mail email
list. For more information see the Bugtraq archive at:
http://www.geek-girl.com/bugtraq/1997_3/0424.html
This Security Alert closes Caldera internal problem report #1106.
V. PGP Signature
This message was signed with the PGP key for <security@caldera.com>.
This key can be obtained from:
ftp://ftp.caldera.com/pub/pgp-keys/
Or on an OpenLinux CDROM under:
/OpenLinux/pgp-keys/
$Id: SA-1997.27,v 1.2 1997/11/27 01:08:31 ron Exp ron $
-----BEGIN PGP SIGNATURE-----
Version: 2.6.2
iQCVAwUBNHzIl+n+9R4958LpAQGM5AP+JkrAhGzjeo71QiOEqdvw3OrTZXwirXuM
/7qVyHpJy5qk233B1gRUgOZLH+t13yQ/4VCiYuo+NWkcBbGphDAd5loM+2gD2Y9s
z3cBNwOwAZlu0VR3gy7usiPtyePsdt6WVKseua3AXPZBVrrZmmk6SosTa74lc4EU
ZRvnp5uKzb0=
=k63u
-----END PGP SIGNATURE-----