Updated: October 07, 2003
Affected
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
Conectiva, S.A. has released Conectiva Linux Security Announcement CLA-2003:750 in response to this issue. Users are encouraged to review this announcement and apply the patches it refers to.
Updated: October 07, 2003
Affected
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1 GENTOO LINUX SECURITY ANNOUNCEMENT 200309-16 PACKAGE : net-ftp/proftpd
SUMMARY : ASCII File Remote Compromise Vulnerability
DATE : 2003-09-28 00:37 UTC
EXPLOIT : remote
VERSIONS AFFECTED :
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Updated: October 07, 2003
Affected
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
The Linux Mandrake Security Team has released Mandrake Linux Security Update Advisory MDKSA-2003:095 in response to this issue. Users are encouraged to review this advisory and apply the patches it refers to.
Updated: October 07, 2003
Affected
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
The OpenPKG development team has released OpenPKG Security Advisory OpenPKG-SA-2003.043 in response to this issue. Users are encouraged to review this advisory and apply the patches it refers to.
Updated: October 07, 2003
Affected
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
The following versions of ProFTPD are believed to be affected: ProFTPD 1.2.7 ProFTPD 1.2.8 ProFTPD 1.2.8rc1 ProFTPD 1.2.8rc2 ProFTPD 1.2.9rc1 ProFTPD 1.2.9rc2 The ProFTPD development team has released the following versions which contain a patch for this vulnerability: ProFTPD 1.2.7p ProFTPD 1.2.8p ProFTPD 1.2.9rc1p ProFTPD 1.2.9rc2p Users employing the ProFTPD software built from the distribution source code are encouraged to upgrade to one of the patched versions above.
Updated: October 07, 2003
Affected
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 [slackware-security] ProFTPD Security Advisory (SSA:2003-259-02) Upgraded ProFTPD packages are available for Slackware 8.1, 9.0 and - -current. These fix a security issue where an attacker could gain a root shell by downloading a specially crafted file. Here are the details from the Slackware 9.0 ChangeLog: Tue Sep 23 14:43:10 PDT 2003 n/proftpd-1.2.8p-i486-1.tgz: Upgraded to proftpd-1.2.8p (patched). This fixes a security problem in ProFTPD. From http://www.proftpd.org: X-Force Research at ISS has discovered a remote exploit in ProFTPD's handling of ASCII translations that an attacker, by downloading a carefully crafted file, can exploit and gain a root shell. The source distributions on ftp.proftpd.org have all been replaced with patched versions. All ProFTPD users are strongly urged to upgrade to one of the patched versions as soon as possible. Note that the upgraded package does not change the displayed version number to 1.2.8p (it remains 1.2.8), but we've verified the source code to make sure that this is in fact the patched version. We recommend all sites running ProFTPD upgrade to the new package right away. (* Security fix *) WHERE TO FIND THE NEW PACKAGES: Updated package for Slackware 8.1: ftp://ftp.slackware.com/pub/slackware/slackware-8.1/patches/packages/proftpd-1.2.8p-i386-1.tgz Updated package for Slackware 9.0: ftp://ftp.slackware.com/pub/slackware/slackware-9.0/patches/packages/proftpd-1.2.8p-i386-1.tgz Updated package for Slackware -current: ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/proftpd-1.2.8p-i486-1.tgz MD5 SIGNATURES: Slackware 8.1 package: 8b31d10bab91a0d4a22c7eac69a90087 proftpd-1.2.8p-i386-1.tgz Slackware 9.0 package: 391d5e24bade1ff98281465d230ddad5 proftpd-1.2.8p-i386-1.tgz Slackware -current package: 2636a2306a6acb0d8726995de9013678 proftpd-1.2.8p-i486-1.tgz INSTALLATION INSTRUCTIONS: Upgrade using upgradepkg (as root): # upgradepkg proftpd-1.2.8p-i386-1.tgz Slackware Linux Security Team http://slackware.com/gpg-key security@slackware.com | HOW TO REMOVE YOURSELF FROM THIS MAILING LIST: | | Send an email to majordomo@slackware.com with this text in the body of | | the email message: | | unsubscribe slackware-security | | You will get a confirmation message back. Follow the instructions to | | complete the unsubscription. Do not reply to this message to | | unsubscribe! -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.3 (GNU/Linux) iD8DBQE/cS5vakRjwEAQIjMRAkFrAJwJKwrmG8uQcfV7F2t7iYLJc0Ct2wCfU+Ju iXVgdLU5x2/hPLKAZqo0qXU= =IFC8 -----END PGP SIGNATURE-----
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Updated: October 07, 2003
Affected
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1 Trustix Secure Linux Security Advisory #2003-0037 Package name: proftpd
Summary: remote exploit if upload enabled
Date: 2003-09-27
Affected versions: TSL 1.2, 1.5, 2.0 Package description: ProFTPd is an enhanced FTP server with a focus toward simplicity,
security, and ease of configuration. It features a very Apache-like
configuration syntax, and a highly customizable server infrastructure,
including support for multiple 'virtual' FTP servers, anonymous FTP, and
permission-based directory visibility. Problem description: An error exists in the ASCII upload handling of Proftpd version 1.2.7
and later that can be used to trigger an buffer overflow and thus
execute arbitrary code. This has now been fixed. Action: We recommend that all systems with this package installed be upgraded. Please note that if you do not need the functionality provided by this
package, you may want to remove it from your system. Location: All TSL updates are available from
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Updated: October 07, 2003
Affected
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
The TurboLinux Security Team has released Turbolinux Security Advisory TLSA-2003-54 in response to this issue. Users are encouraged to review this advisory and apply the patches it refers to.