Date: Fri, 30 Nov 2001 14:37:01 -0800
From: [email protected]
To: [email protected], [email protected],
Subject: Security Update: [CSSA-2001-SCO.36] Open UNIX, UnixWare 7: wu-ftpd ftpglob() vulnerability
--qDbXVdCdHGoSgWSk
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable
To: [email protected][email protected] scoannmod@xenitec.=
on.ca
___________________________________________________________________________
Caldera International, Inc. Security Advisory
Subject: Open UNIX, UnixWare 7: wu-ftpd ftpglob() vulnerability
Advisory number: CSSA-2001-SCO.36
Issue date: 2001 November 30
Cross reference:
___________________________________________________________________________
1. Problem Description
=09
A vulnerability in the wu-ftpd ftpglob() function was found by
the CORE ST team. This vulnerability can be exploited to
obtain root access on the ftp server.
=20
2. Vulnerable Versions
Operating System Version Affected Files
------------------------------------------------------------------
UnixWare 7 All /usr/sbin/in.ftpd
Open UNIX 8.0.0 /usr/sbin/in.ftpd
3. Workaround
None.
4. UnixWare 7, Open UNIX 8
4.1 Location of Fixed Binaries
ftp://stage.caldera.com/pub/security/openunix/CSSA-2001-SCO.36/
4.2 Verification
md5 checksums:
=09
9294a9d1a467b72d7ee9bb37672855a0 erg711908.Z
md5 is available for download from
ftp://stage.caldera.com/pub/security/tools/
4.3 Installing Fixed Binaries
Upgrade the affected binaries with the following commands:
Download erg711908.Z to /tmp
=09
# uncompress /tmp/erg711908.Z
# pkgadd -d /tmp/erg711908
5. References
CORE-20011001: Wu-FTP glob heap corruption vulnerability
http://www.corest.com
CERT Advisory CA-2001-33 Multiple Vulnerabilities in WU-FTPD
http://www.cert.org=09http://cve.mitre.org/cgi-bin/cvename.cgi?name=3DCAN-2001-0550
This and other advisories are located at
http://stage.caldera.com/support/security
This advisory addresses Caldera Security internal incidents
sr856023, fz519403, erg711908.
=09
6. Disclaimer
Caldera International, Inc. is not responsible for the misuse
of any of the information we provide on our website and/or
through our security advisories. Our advisories are a service
to our customers intended to promote secure installation and
use of Caldera International products.
7. Acknowledgements
This vulnerability was originally reported by Matt Power of
BindView on the vuln-dev mailing list.
___________________________________________________________________________
--qDbXVdCdHGoSgWSk
Content-Type: application/pgp-signature
Content-Disposition: inline
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (SCO_SV)
Comment: For info see http://www.gnupg.org
iEYEARECAAYFAjwICg0ACgkQaqoBO7ipriGKQQCfZNBZdjB4wJM7HVGkagyp8/IT
wtEAniqidryyyoNkvXcUHvikD4b3bf3h
=MfGs
-----END PGP SIGNATURE-----
--qDbXVdCdHGoSgWSk--