Security Update [CSSA-2001-041.0] Linux - Vulnerability in wu-ftpd

From: Support Info (supinfo@caldera.com)
Date: 11/29/01


Date: Wed, 28 Nov 2001 16:30:18 -0700
From: Support Info <supinfo@caldera.com>
To: announce@lists.caldera.com, bugtraq@securityfocus.com, linux-security@redhat.com, linuxlist@securityportal.com
Subject: Security Update [CSSA-2001-041.0] Linux - Vulnerability in wu-ftpd
Message-ID: <20011128163018.A26776@phoenix.calderasystems.com>


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

______________________________________________________________________________
                   Caldera International, Inc. Security Advisory

Subject: Linux - Vulnerability in wu-ftpd
Advisory number: CSSA-2001-041.0
Issue date: 2001, November 28
Cross reference:
______________________________________________________________________________

1. Problem Description

   The CoreST team has discovered a vulnerability in wu-ftpd that can be
   exploited to obtain root access to the FTP server.
   
   We recommend that customers immediately upgrade to the fixed
   version. If you do not need FTP service, remove the package.

2. Vulnerable Versions

   System Package
   -----------------------------------------------------------
   OpenLinux 2.3 All packages previous to
                                 wu-ftpd-2.6.1-13OL
   
   OpenLinux eServer 2.3.1 All packages previous to
   and OpenLinux eBuilder wu-ftpd-2.6.1-13OL
   
   OpenLinux eDesktop 2.4 All packages previous to
                                 wu-ftpd-2.6.1-13OL
   
   OpenLinux Server 3.1 All packages previous to
                                 wu-ftpd-2.6.1-13
   
   OpenLinux Workstation 3.1 not vulnerable
   

3. Solution

   Workaround

     If you do not need wu-ftpd isntalled, remove it by running
     the following command as root:
             
        rpm -e wu-ftpd

   The proper solution is to upgrade to the latest packages.

4. OpenLinux 2.3

    4.1 Location of Fixed Packages

       The upgrade packages can be found on Caldera's FTP site at:

       ftp://ftp.caldera.com/pub/updates/OpenLinux/2.3/current/RPMS

       The corresponding source code package can be found at:

       ftp://ftp.caldera.com/pub/updates/OpenLinux/2.3/current/SRPMS

   4.2 Verification

       d6a618f9fe6a3ae99a1c54a405ab169a RPMS/wu-ftpd-2.6.1-13OL.i386.rpm
       64ee3731783c12da3a5c164acb3ed239 SRPMS/wu-ftpd-2.6.1-13OL.src.rpm
       

   4.3 Installing Fixed Packages

       Upgrade the affected packages with the following commands:

         rpm -Fvh wu-ftpd-2.6.1-13OL.i386.rpm
         

5. OpenLinux eServer 2.3.1 and OpenLinux eBuilder for ECential 3.0

    5.1 Location of Fixed Packages

       The upgrade packages can be found on Caldera's FTP site at:

       ftp://ftp.caldera.com/pub/updates/eServer/2.3/current/RPMS

       The corresponding source code package can be found at:

       ftp://ftp.caldera.com/pub/updates/eServer/2.3/current/SRPMS

   5.2 Verification

       a9396078593fc3e4445d3d691df484be RPMS/wu-ftpd-2.6.1-13OL.i386.rpm
       64ee3731783c12da3a5c164acb3ed239 SRPMS/wu-ftpd-2.6.1-13OL.src.rpm
       

   5.3 Installing Fixed Packages

       Upgrade the affected packages with the following commands:

         rpm -Fvh wu-ftpd-2.6.1-13OL.i386.rpm
         

6. OpenLinux eDesktop 2.4

    6.1 Location of Fixed Packages

       The upgrade packages can be found on Caldera's FTP site at:

       ftp://ftp.caldera.com/pub/updates/eDesktop/2.4/current/RPMS

       The corresponding source code package can be found at:

       ftp://ftp.caldera.com/pub/updates/eDesktop/2.4/current/SRPMS

   6.2 Verification

       3edfa831ea0d3cc94f3b7a1e1bd49723 RPMS/wu-ftpd-2.6.1-13OL.i386.rpm
       64ee3731783c12da3a5c164acb3ed239 SRPMS/wu-ftpd-2.6.1-13OL.src.rpm
       

   6.3 Installing Fixed Packages

       Upgrade the affected packages with the following commands:

         rpm -Fvh wu-ftpd-2.6.1-13OL.i386.rpm
         

7. OpenLinux 3.1 Server

    7.1 Location of Fixed Packages

       The upgrade packages can be found on Caldera's FTP site at:

       ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1/Server/current/RPMS

       The corresponding source code package can be found at:

       ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1/Server/current/SRPMS

   7.2 Verification

       13e54795ceba03b48c7ac4a9c7616d70 RPMS/wu-ftpd-2.6.1-13.i386.rpm
       a14359f0a93b7e82d20df2c000a81b9a SRPMS/wu-ftpd-2.6.1-13.src.rpm
       

   7.3 Installing Fixed Packages

       Upgrade the affected packages with the following commands:

         rpm -Fvh wu-ftpd-2.6.1-13.i386.rpm
         

8. OpenLinux 3.1 Workstation

    not vulnerable

9. References

   This and other Caldera security resources are located at:

   http://www.caldera.com/support/security/index.html

   This security fix closes Caldera's internal Problem Report 11023.

10. Disclaimer

   Caldera International, Inc. is not responsible for the misuse of
   any of the information we provide on this website and/or through our
   security advisories. Our advisories are a service to our customers
   intended to promote secure installation and use of Caldera OpenLinux.

11. Acknowledgements

   Caldera wishes to thank Core ST and Ivan Arce for their efforts to
   coordinate the publication of this vulnerability with all affected
   vendors.
______________________________________________________________________________
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iD8DBQE8BPPs18sy83A/qfwRAibEAJ9UyVv9Id1cAf+c/Nf3I6G0LhWi9QCdFggY
3ueP7zZUEQzVV6nWcJjzm8Y=
=TUo7
-----END PGP SIGNATURE-----