Date: Thu, 29 Nov 2001 17:18:19 -0800
From: Immunix Security Team <[email protected]>
To: [email protected], [email protected],
Subject: Immunix 7.0 wu-ftpd format string bug
--5QcriFbbFkKgT3aH
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable
-----------------------------------------------------------------------
Immunix OS Security Advisory
Packages updated: wu-ftpd
Affected products: Immunix 7.0
Bugs fixed: immunix/1865
Date: Thu Nov 29 2001
Advisory ID: IMNX-2001-70-036-02
Author: Seth Arnold <[email protected]>
-----------------------------------------------------------------------
Description:
This is a re-release of wu-ftpd. New patches are available today that
fix several format string problems, believed to be not exploitable.
There is also a null-pointer dereference check added in several
places, also believed to be not exploitable.
As such, we believe this to be a reliability update only in comparison
to the update in advisory IMNX-2001-70-036-01 -- however, the bug in
yesterday's advisory was at one time believed to be not exploitable as
well. As such, installing this update is a good idea, but not critical
at this point.
It cannot be stressed enough that at least one of IMNX-2001-70-036-01
or IMNX-2001-70-036-02 must be applied quickly; it is rumored this
flaw is being actively exploited.
References:
http://www.securityfocus.com/archive/1/242750http://www.securityfocus.com/archive/1/242964
Package names and locations:
Precompiled binary packages for Immunix 7.0 are available at:
http://download.immunix.org/ImmunixOS/7.0/updates/RPMS/wu-ftpd-2.6.1-6_imnx=
_5.i386.rpm
Source package for Immunix 7.0 is available at:
http://download.immunix.org/ImmunixOS/7.0/updates/SRPMS/wu-ftpd-2.6.1-6_imn=
x_5.src.rpm
Immunix OS 7.0 md5sums:
f3e1b292c522b9b1fd5f813d60bf7e9c RPMS/wu-ftpd-2.6.1-6_imnx_5.i386.rpm
54c7c7eabcb31624664cb4907747ed0c SRPMS/wu-ftpd-2.6.1-6_imnx_5.src.rpm
GPG verification: =
=20
Our public key is available at <http://wirex.com/security/GPG_KEY>. =
=20
*** NOTE *** This key is different from the one used in advisories =
=20
IMNX-2001-70-020-01 and earlier.
Online version of all Immunix 6.2 updates and advisories:
http://immunix.org/ImmunixOS/6.2/updates/
Online version of all Immunix 7.0-beta updates and advisories:
http://immunix.org/ImmunixOS/7.0-beta/updates/
Online version of all Immunix 7.0 updates and advisories:
http://immunix.org/ImmunixOS/7.0/updates/
NOTE:
Ibiblio is graciously mirroring our updates, so if the links above are
slow, please try:
ftp://ftp.ibiblio.org/pub/Linux/distributions/immunix/
or one of the many mirrors available at:
http://www.ibiblio.org/pub/Linux/MIRRORS.html
ImmunixOS 6.2 is no longer officially supported.
Contact information:
To report vulnerabilities, please contact [email protected]. WireX=20
attempts to conform to the RFP vulnerability disclosure protocol
<http://www.wiretrip.net/rfp/policy.html>.
--5QcriFbbFkKgT3aH
Content-Type: application/pgp-signature
Content-Disposition: inline
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org
iEYEARECAAYFAjwG3loACgkQVQcWL60UVMsIEACeOlPzdtG8UT2JR5iOjFtpqqQj
IvYAn1qHrjWiygX75kqY3QYE8d+JL67G
=SpWm
-----END PGP SIGNATURE-----
--5QcriFbbFkKgT3aH--