Red Hat 6.0 RHSA-1999:031-01 critical: wu-ftpd buffer overflow issue
Summary
Summary
An explotable buffer overflow security problem in the wu-ftpd daemon hasbeen fixed.
The previous errata for wu-ftpd did not update /var/run/utmp correctlywhen a session was disconnected. This problem manifested itself aslast displaying connections that had terminated as still active.
A minor and obscure problem with members not in a configured classbeing permitted to login on the second attempt has been fixed.
Thanks go to Gregory A. Lundberg of the WU-FTPD Development Group forsupplying the patches.
Solution
For each RPM for your particular architecture, run:
rpm -Uvh filename
where filename is the name of the RPM.
Then restart inetd by typing:
/etc/rc.d/init.d/inet restart
9. Verification:
MD5 sum Package Name
f73f420b55128a2228e8c6cf5692fc64 6.0/SRPMS/wu-ftpd-2.5.0-5.6.0.src.rpm
0d13ec35e8ad4bb6f44ba7489c7d8a84 6.0/alpha/wu-ftpd-2.5.0-5.6.0.alpha.rpm
cdac8067673e58ed64f3a96d5ba5b6f9 6.0/i386/wu-ftpd-2.5.0-5.6.0.i386.rpm
22cfce1de906e413fe5561fd36a35d2f 6.0/sparc/wu-ftpd-2.5.0-5.6.0.sparc.rpm
These packages are also PGP signed by Red Hat Inc. for security. Our
key is available at:
You can verify each package with the following command:
rpm --checksig filename
If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
rpm --checksig --nopgp filename
References
Package List
Topic
Topic
New packages of wu-ftpd are available for all Red Hat Linux platforms. This
version includes an important security fix as well as fixes for all known
problems in wu-ftpd at this time.
2. Bug IDs fixed:
1599 3482 3866
Relevant Releases Architectures
Red Hat Linux 6.0, all architectures
4. Obsoleted by:
None
5. Conflicts with:
None
6. RPMs required:
Intel:
wu-
ftpd-2.5.0-5.6.0.i386.rpm
Alpha:
wu-
ftpd-2.5.0-5.6.0.alpha.rpm
SPARC:
wu-
ftpd-2.5.0-5.6.0.sparc.rpm
Source:
wu-
ftpd-2.5.0-5.6.0.src.rpm
Architecture neutral:
Bugs Fixed