SuSE: 'lukemftp' Remote command execution vulnerability
Summary
______________________________________________________________________________
SuSE Security Announcement
Package: lukemftp, nkitb, nkitserv
Announcement-ID: SuSE-SA:2002:018
Date: Wednesday, May 15th 2002 12:30 MEST
Affected products: 6.4, 7.0, 7.1, 7.2, 7.3, 8.0
SuSE eMail Server III
SuSE Linux Database Server
SuSE Firewall Adminhost VPN
SuSE Linux Live-CD for Firewall
SuSE Linux Admin-CD for Firewall
SuSE Linux Connectivity Server
SuSE Linux Enterprise Server 7
SuSE Linux Enterprise Server for S/390
Vulnerability Type: remote command execution
Severity (1-10): 3
SuSE default package: yes
Other affected systems: all systems using lukemftp
Content of this advisory:
1) security vulnerability resolved: buffer overflow while parsing PASV
command
problem description, discussion, solution and upgrade information
2) pending vulnerabilities, solutions, workarounds
3) standard appendix (further information)
______________________________________________________________________________
1) problem description, brief discussion, solution, upgrade information
Lukemftp (ftp(1), /usr/bin/ftp, /usr/bin/pftp) is a compfortable ftp
client from NetBSD.
A buffer overflow could be triggered by an malicious ftp server while the
client parses the PASV ftp command. An attacker who control an ftp server
to which a client using lukemftp is connected can gain remote access to
the clients machine with the privileges of the user running lukeftp.
The lukemftp RPM package is installed by default.
You need to update the package, as no temporary workaround is possbible.
Please download the update package for your distribution and verify its
integrity by the methods listed in section 3) of this announcement.
Then, install the package using the command "rpm -Fhv file.rpm" to apply
the update.
Our maintenance customers are being notified individually. The packages
are being offered to install from the maintenance web.
i386 Intel Platform:
SuSE-8.0
0ae28f7ca49157bfa5783626d3e82cef
source rpm:
d9fc530c338ea2de122b6a4a1f89a627
SuSE-7.3
aeb64a5ba64b5b334dfcf244423a9809
source rpm:
cc94b939696c76cda0fec683d12ff384
SuSE-7.2
94812aeb3b164a67b0c85b0c9a61a450
source rpm:
5cd6642505a68be70ce9eac3ba5dd311
SuSE-7.1
836df6046ce81fcc82e9939fde5003d1
source rpm:
788bc38fed7b486e857b5d780451b7a7
SuSE-7.0
e6199c28c700461a7ae10c3f7fba73a8
source rpm:
e1c6379846842ea62a5c484167102cae
SuSE-7.0
50bb6a7ae3f450ad530ad92ae8dad3e1
SuSE-6.4
6950a272cf3a30a02860cf179387a9e8
source rpm:
09d7ac9ba5e1420eeddb016a6d812067
Sparc Platform:
SuSE-7.3
295d90e7bfeb94f27f542616e016bd65
source rpm:
42e213cfc930e0a00aa871e9996d3cba
SuSE-7.1
50fc0f99b42347aee746450624ed4817
source rpm:
01cdff7ff9f908466b8d3269fe4529c5
SuSE-7.0
210230a1a085af9f777f047a9edfa9f5
source rpm:
b0e476e5ba4e9211cab20442f35b49d8
SuSE-7.0
70b063b1901c8655a23b008cc6ef4036
AXP Alpha Platform:
SuSE-7.1
27c6ca255ef42c7e6851f309d6474fcd
source rpm:
fdc27d3abae5bf6dfcd06907d2afc278
SuSE-7.0
2c397f234a2326baba98a4da8dff601a
source rpm:
437a49653372205c4218e7283422fd6b
SuSE-7.0
e2943d09b3bf82883bfd62aff74e500b
SuSE-6.4
33b7a7b2f81dc78035450c0643786c83
source rpm:
60960a0129207b317fc22089f6203589
PPC Power PC Platform:
SuSE-7.3
fd6bc23e95cd7a19283dd4067f376bb3
source rpm:
bb301c6487a09a2b3d82ce9b000b8f69
SuSE-7.1
023a43cba32d976d0a5665365242647b
source rpm:
53f38c8f4a3205b3bedbc76b209d177b
SuSE-7.0
101d5af039c262f7b7e7d50598fa064c
source rpm:
ed39244bcb57fad7b92287f5c9d26e3d
SuSE-7.0
b6146585ab16d1d507e04f066f21f5d6
SuSE-6.4
10b66b58b887a1899df7e16b15689bfb
source rpm:
954dcd26ef2eb777e737621927f98835
______________________________________________________________________________
2) Pending vulnerabilities in SuSE Distributions and Workarounds:
- imap
A bug report about a buffer overflow in the RFC1730 code of the wu-imap
eMail server was published. SuSE Linux' imap packages were compiled
without RFC1730 support, so SuSE Linux is not vulnerable to this bug per
default.
- dhcp
A format string bug was found in the DynamicDNS (DDNS) code of ISC's
DHCP server software. New RPMs are currently being build.
- imlib
Due to packaging failures we have to re-release the imlib packages
which should be available within the next days. This update addresses
missing dependencies and affects applications like xcdroast.
- perl-Digest-MD5
A bug was found in the UTF8 interaction between perl and perl-Digest-MD5
which leads into failures while verifying the MD5 hash.
New RPMs are currently being build.
______________________________________________________________________________
3) standard appendix: authenticity verification, additional information
- Package authenticity verification:
SuSE update packages are available on many mirror ftp servers all over
the world. While this service is being considered valuable and important
to the free and open source software community, many users wish to be
sure about the origin of the package and its content before installing
the package. There are two verification methods that can be used
independently from each other to prove the authenticity of a downloaded
file or rpm package:
1) md5sums as provided in the (cryptographically signed) announcement.
2) using the internal gpg signatures of the rpm package.
1) execute the command
md5sum
References