exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

slackware.wuftpd.txt

slackware.wuftpd.txt
Posted Oct 6, 2000
Site slackware.com

Slackware Security Advisory - Wu-ftpd version 2.6.0 has a remote root hole in it. Upgrade to version 2.6.1.

tags | remote, root
systems | linux, slackware
SHA-256 | f4c05db6315d143fbaaf2f0b26c1d45ca2251c59d6c6289431c39597f229591c

slackware.wuftpd.txt

Change Mirror Download
----- Original Message -----
From: "Slackware Security Team" <security@slackware.com>
To: <slackware-security@slackware.com>
Sent: Friday, September 29, 2000 3:27 AM
Subject: [slackware-security] wuftpd vulnerability - Slackware 4.0, 7.0,
7.1, -current


A vulnerability involving an input validation error in the "site exec"
command has recently been identified in the wu-ftpd program (CERT Advisory
CA-2000-13). More information about this problem can be found at this site:

http://www.cert.org/advisories/CA-2000-13.html

The wu-ftpd daemon is part of the tcpip1.tgz package in the N series. A
new tcpip1.tgz package is now available in the Slackware -current tree.
All users of Slackware 7.0, 7.1, and -current are stronly urged to upgrade
to the new tcpip1.tgz package.

For users of Slackware 4.0, a wuftpd.tgz patch package is being provided
in the /patches tree of Slackware 4.0.


=========================================
wu-ftpd 2.6.1 AVAILABLE - (n1/tcpip1.tgz)
=========================================

FOR USERS OF SLACKWARE 7.0, 7.1, and -current:
---------------------------------------------

The recent vulnerability in wu-ftpd can be fixed by upgrading to the
new tcpip1.tgz package. This package upgrades the wu-ftpd server to
version 2.6.1. You can download it from the -current branch:


ftp://ftp.slackware.com/pub/slackware/slackware-current/slakware/n1/tcpip1.tgz

All users of Slackware 7.0, 7.1, and -current are strongly urged to
upgrade to the tcpip1.tgz package to fix the vulnerability in wu-ftpd.

For verification purposes, we provide the following checksums:

16-bit "sum" checksum:
301822053 1017853 n1/tcpip1.tgz

128-bit MD5 message digest:
cbb3fe386341d1b1e99100ba3ff02794 n1/tcpip1.tgz

Installation instructions for the tcpip1.tgz package:

If you have downloaded the new tcpip1.tgz package, you should bring
the system into runlevel 1 and run upgradepkg on it:

# telinit 1
# upgradepkg tcpip1.tgz
# telinit 3



FOR USERS OF SLACKWARE 4.0:
--------------------------

The recent vulnerability in wu-ftpd can be fixed by installing the
wuftpd.tgz patch package. This package upgrades the wu-ftpd server
to version 2.6.1. You can download it from the Slackware 4.0 branch:

ftp://ftp.slackware.com/pub/slackware/slackware-4.0/patches/wuftpd.tgz

All users of Slackware 4.0 are strongly urged to install the wuftpd.tgz
patch package to fix the vulnerability in wu-ftpd.

For verification purposes, we provide the following checksums:

16-bit "sum" checksum:
2781503789 107341 wuftpd.tgz

128-bit MD5 message digest:
75547b1762d7ff4fad233cd89529ff2c wuftpd.tgz

Installation instructions for the wuftpd.tgz package:

If you have downloaded the wuftpd.tgz patch package, you should bring
the system into runlevel 1 and run installpkg on it:

# telinit 1
# installpkg wuftpd.tgz
# telinit 3


Remember, it's also a good idea to backup configuration files before
upgrading packages.

- Slackware Linux Security Team
http://www.slackware.com

Login or Register to add favorites

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close