Updated: August 15, 2003
Affected
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
Please see http://docs.info.apple.com/article.html?artnum=61798
Updated: August 01, 2003
Affected
Conectiva Linux does ship a vulnerable version of wu-ftpd, but the default ftp server we install is proftpd. Updated packages will be available shortly on our ftp server and and announcement will be sent to our mailing lists.
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Updated: August 04, 2003
Not Affected
Cray Inc. is not vulnerable.
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Updated: August 01, 2003
Affected
Debian GNU/Linux Updated wu-ftpd packages will be available at http://www.debian.org/security/2003/dsa-357
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Updated: August 04, 2003
Affected
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
Please see, ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-03%3A08.realpath.asc
Updated: August 15, 2003
Affected
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Updated: August 15, 2003
Not Affected
The AIX operating system does not ship with wu-ftpd and is not affected by the issues discussed in CERT Vulnerability Note VU#743092. wu-ftpd is available for installation on AIX via the AIX Toolbox for Linux. The wu-ftpd binary provided in the Toolbox is not vulnerable to the issues discussed in VU#743092. Please note the AIX Toolbox is offered on an "as is" basis and is unwarranted. Please note that AIX's implementation of realpath() in libc.a is not vulnerable to this issue.
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Updated: August 15, 2003
Affected
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Updated: August 15, 2003
Not Affected
Ingrian Networks products are not vulnerable to this issue.
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Updated: July 31, 2003
Affected
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1 Mandrake Linux Security Update Advisory Package name: wu-ftpd
Advisory ID: MDKSA-2003:080
Date: July 31st, 2003 Affected versions: 8.2 Problem Description: A vulnerability was discovered by Janusz Niewiadomski and Wojciech
Purczynski in the wu-ftpd FTP server package. They found an off-by-
one bug in the fb_realpath() function which could be used by a
remote attacker to obtain root privileges on the server. This bug
can only be successfully accomplished by using wu-ftpd binaries
compiled on Linux 2.0.x and later 2.4.x kernels because the 2.2.x
and earlier 2.4.x kernels define PATH_MAX to be 4095 characters. wu-ftpd is no longer shipped with Mandrake Linux, however Mandrake
Linux 8.2 did come with wu-ftpd. If you use wu-ftpd, you are
encouraged to upgrade to these patched packages. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0466 Updated Packages: Mandrake Linux 8.2: 77260fab82a32fd204e29160c11f1e30 8.2/RPMS/wu-ftpd-2.6.2-1.1mdk.i586.rpm
3fd974bd1e718accf048e489dbd52d55 8.2/SRPMS/wu-ftpd-2.6.2-1.1mdk.src.rpm Mandrake Linux 8.2/PPC: 283cf3a7797ca19c8e83ae22c0415fd5 ppc/8.2/RPMS/wu-ftpd-2.6.2-1.1mdk.ppc.rpm
3fd974bd1e718accf048e489dbd52d55 ppc/8.2/SRPMS/wu-ftpd-2.6.2-1.1mdk.src.rpm Bug IDs fixed (see https://qa.mandrakesoft.com for more information): To upgrade automatically, use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you. A list of FTP mirrors can be obtained from: http://www.mandrakesecure.net/en/ftp.php All packages are signed by MandrakeSoft for security. You can obtain
the GPG public key of the Mandrake Linux Security Team by executing: gpg --recv-keys --keyserver www.mandrakesecure.net 0x22458A98 Please be aware that sometimes it takes the mirrors a few hours to
update. You can view other update advisories for Mandrake Linux at: http://www.mandrakesecure.net/en/advisories/ MandrakeSoft has several security-related mailing list services that
anyone can subscribe to. Information on these lists can be obtained by
visiting: http://www.mandrakesecure.net/en/mlist.php If you want to report vulnerabilities, please contact security_linux-mandrake.com Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Linux Mandrake Security Team
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Updated: August 04, 2003
Affected
NetBSD's realpath(3) implementation is affected by this bug. The full advisory will be available at the following URL when published: ftp://ftp.NetBSD.org/pub/NetBSD/security/advisories/NetBSD-SA2003-011.txt.asc
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Updated: August 04, 2003
Affected
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
Please see, http://www.openbsd.org/errata.html#realpath
Updated: July 31, 2003
Not Affected
Openwall GNU/*/Linux is not vulnerable. We ship vsftpd and not wu-ftpd.
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Updated: August 01, 2003
Affected
Red Hat Linux versions prior to version 9, and Red Hat Enterprise Linux Server ship with wu-ftpd packages that contain this bug. New wu-ftpd packages are now available along with our advisory at the URLs below. Users of the Red Hat Network can update their systems using the 'up2date'tool. Red Hat Enterprise Linux: http://rhn.redhat.com/errata/RHSA-2003-246.html Red Hat Linux: http://rhn.redhat.com/errata/RHSA-2003-245.html
The vendor has not provided us with any further information regarding this vulnerability.
Updated: August 01, 2003
Not Affected
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Updated: August 04, 2003
Affected
The Solaris 9 FTP Server is based on WU-ftpd, therefore Solaris 9 is affected by this issue. Sun will be issuing a Sun Alert for Solaris 9 describing the patch information which will be available from: http://sunsolve.Sun.COM/pub-cgi/retrieve.pl?doc=fsalert/56121 Sun Linux on the Sun Cobalt LX50 system is also affected as it ships with WU-ftpd. Sun will also be issuing a Sun Alert for Sun Cobalt LX50 describing the patch information which will be available from: http://sunsolve.Sun.COM/No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Updated: August 01, 2003
Affected
-----BEGIN PGP SIGNED MESSAGE----- SuSE Security Announcement Package: wuftpd
Announcement-ID: SuSE-SA:2003:032
Date: Thursday, July 31st 2003 18:00 MEST
Affected products: 7.2, 7.3
SuSE Linux Enterprise Server 7
SuSE Linux Connectivity Server
SuSE Linux Office Server
Vulnerability Type: remote buffer overflow
Severity (1-10): 7
SuSE default package: no
Cross References: CAN-2003-0466 Content of this advisory: 1) security vulnerability resolved: wuftpd
problem description, discussion, solution and upgrade information
2) pending vulnerabilities, solutions, workarounds
3) standard appendix (further information) 1) problem description, brief discussion, solution, upgrade information Janusz Niewiadomski and Wojciech Purczynski of iSEC Security Research
have found a single byte buffer overflow in the Washington University
ftp daemon (wuftpd), a widely used ftp server for Linux-like systems. It is yet unclear if this bug is (remotely) exploitable. Positive
exploitability may result in a remote root compromise of a system
running the wuftpd ftp daemon. Notes: * SuSE Linux products do not contain wuftpd any more starting with SuSE
Linux 8.0 and SuSE Linux Enterprise Server 8. The wuftpd package has
been substituted by a different server implementation of the file
transfer protocol server. * The affected wuftpd packages in products as stated in the header of
this announcement actually ship two different wuftpd ftp daemon
versions: The older version 2.4.x that is installed as
/usr/sbin/wu.ftpd, the newer version 2.6 is installed as
/usr/sbin/wu.ftpd-2.6 . The 2.4.x version does not contain the
defective parts of the code and is therefore not vulnerable to the
weakness found. * If you are using the wuftpd ftp daemon in version 2.4.x, you might
want to update the package anyway in order not to risk an insecure
configuration once you switch to the newer version. There exists no workaround that can fix this vulnerability on a temporary
basis other than just using the 2.4.x version as mentioned above. The proper fix for the weakness is to update the package using the
provided update packages. Please download the update package for your distribution and verify its
integrity by the methods listed in section 3) of this announcement. Then, install the package using the command "rpm -Fhv file.rpm" to apply
the update. Our maintenance customers are being notified individually. The packages
are being offered to install from the maintenance web. Intel i386 Platform: SuSE-7.3: ftp://ftp.suse.com/pub/suse/i386/update/7.3/n2/wuftpd-2.6.0-403.i386.rpm
9f786439f4efc289dbaee78a8c873b56
source rpm(s): ftp://ftp.suse.com/pub/suse/i386/update/7.3/zq1/wuftpd-2.6.0-403.src.rpm
6f748bfc27cc44ade2c2044365fb825a SuSE-7.2: ftp://ftp.suse.com/pub/suse/i386/update/7.2/n2/wuftpd-2.6.0-403.i386.rpm
077463a6387d8b596cfedb6f80d765aa
source rpm(s): ftp://ftp.suse.com/pub/suse/i386/update/7.2/zq1/wuftpd-2.6.0-403.src.rpm
5bd18ea86422a84338fc1827362e8bdc Sparc Platform: SuSE-7.3: ftp://ftp.suse.com/pub/suse/sparc/update/7.3/n2/wuftpd-2.6.0-260.sparc.rpm
985a2bdcb25ec5283a00784810b28050
source rpm(s): ftp://ftp.suse.com/pub/suse/sparc/update/7.3/zq1/wuftpd-2.6.0-260.src.rpm
49d647216d0f1b22a5a326887d8ef955 PPC Power PC Platform: SuSE-7.3: ftp://ftp.suse.com/pub/suse/ppc/update/7.3/n2/wuftpd-2.6.0-328.ppc.rpm
f8b1276d87cb5dcb4aca89054015a353
source rpm(s): ftp://ftp.suse.com/pub/suse/ppc/update/7.3/zq1/wuftpd-2.6.0-328.src.rpm
07ff383965af6b860e5cfda95efa2fce 2) Pending vulnerabilities in SuSE Distributions and Workarounds: - gnats
Several security bugs were reported in gnats. The version of gnats
that comes with SuSE Linux is not vulnerable to these problems. - kopete
Kopete is the KDE instant messenger. A bug in kopete's gpg plugin can
be abused to execute commands remotely. A fix will be available as
soon as possible. - wget
When handling long URLs, a buffer underrun may occur in the wget
program. This underrun may be exploitable remotely. The update
packages are available now on our ftp servers. - emacs
Due to insecure temporary file handling in the semi and wemi library
of GNU Emacs it is possible for a local attacker to overwrite
arbitrary files of the user running emacs. The fix is currently being
worked on. - ethereal
Several remote exploitable bugs were found in the network analyzing
tool ethereal. The update packages are available on our ftp servers. - tomcat
Wrong file permission and clear passwords in the tomcat default
installation allows local users to gain security relevant data by
reading the file /opt/jakarta/tomcat/conf/tomcat-users.xml. Please enable password encryption and revoke the read permissions
for 'group' and 'others' by adding the following line to
/etc/permissions.local: /opt/jakarta/tomcat/conf/tomcat-users.xml wwwrun.root 0700
and run the following command as root: "chkstat -set /etc/permissions.local" - heartbeat
A format string bug in heartbeat's debug code can be exploited
by a remote attacker if the debug level is high and the heartbeat
daemon in configuered in an unsecure manner. The update packages are
being tested right now. - freeradius
A buffer overflow in the CHAP implementation of freeradius leads to a
remotely exploitable security hole which can be abused to execute
arbitrary code on the RADIUS server. The update packages are being
tested right now. - traceroute(-nanog)
An integer overflow in traceroute-nanog can be abused to gain
access to the raw ip socket. We are working on the fix. - kdelibs
Due to the fact of verifying the IP address instead of the Common
Name (CN) field of the X.509 certificate the SSL implementation of
KDE 2.2 and earlier is vulnerable to a MiM attack. Only SuSE Linux 7.3 is affected by this problem. Update packages
are available on our FTP servers. - man
The mandb program which is part of the man package contains a
buffer overflow which allows local attackers to execute arbitrary
code as man user. New packages are already availabale on our ftp
servers. - several minor bug fixes
There are alot more minor security updates in the queue. YOU (Yast
Online Update) will inform you when they appear. Alternatively you
may want to monitor the following website: http://www.suse.de/de/private/download/updates/index.html
or: http://www.suse.de/en/private/download/updates/index.html 3) standard appendix: authenticity verification, additional information - Package authenticity verification: SuSE update packages are available on many mirror ftp servers all over
the world. While this service is being considered valuable and important
to the free and open source software community, many users wish to be
sure about the origin of the package and its content before installing
the package. There are two verification methods that can be used
independently from each other to prove the authenticity of a downloaded
file or rpm package: 1) md5sums as provided in the (cryptographically signed) announcement. 2) using the internal gpg signatures of the rpm package. 1) execute the command
md5sum
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Updated: August 04, 2003
Affected
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1 This is an announcement only email list for the x86 architecture. Turbolinux Security Announcement 04/Aug/2003 The following page contains the security information of Turbolinux Inc. - Turbolinux Security Center
http://www.turbolinux.com/security/ (1) wu-ftpd -> Wu-ftpd fb_realpath() off-by-one bug * wu-ftpd -> Wu-ftpd fb_realpath() off-by-one bug More information : The fb_realpath() function in Wu-ftpd FTP server contains off-by-one bug. Impact : This vulnerability may allow remote authenticated users to execute
arbitrary code via commands that cause long pathnames. Affected Products : - Turbolinux Advanced Server 6
- Turbolinux Server 6.1
- Turbolinux Workstation 6.0 Solution : Please use turbopkg tool to apply the update.
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Updated: August 15, 2003
Affected
Wind River Systems, Inc. has created the M431-010 patch for BSD/OS 4.3.1 based systems and the M500-011 patch for BSD/OS 5.0 based systems.
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Updated: August 15, 2003
Affected
Please note the patch has been placed on the website and FTP area.
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.