-----BEGIN PGP SIGNED MESSAGE----- ______________________________________________________________________________ Caldera Systems, Inc. Security Advisory Subject: buffer overflow in wu-ftpd-2.5 Advisory number: CSSA-1999-2.3:001.0 Issue date: 1999 August, 25 Cross reference: ______________________________________________________________________________ 1. Problem Description There is a buffer overflow in wu-ftpd-2.5, which can be used by a remote attacker to gain super user privilege. If you have anonymous FTP enabled, this means that anybody who can reach your machine from the Internet can take it over. If you have anonymous FTP disabled, this hole can still be exploited by users with an account on your machine to obtain root privilege. 2. Vulnerable Versions Systems : COL 2.3 Packages: previous to wu-ftpd-2.5-2 3. Solutions Workarounds: If you do not need to offer FTP service to anyone, simply remove the FTP server package using rpm -e wu-ftpd If you want to offer FTP service to local users, but do not need anonymous FTP, you can disable anonymous FTP by adding the user name `ftp' to the file /etc/ftpusers: echo ftp >> /etc/ftpusers Note that local users may still breach security with this setup. The proper solution is to upgrade to the latest packages rpm -U wu-ftpd-2.5-2.i386.rpm 4. Location of Fixed Packages The upgrade packages can be found on Caldera's FTP site at: ftp://ftp.calderasystems.com/pub/OpenLinux/updates/2.3/current/RPMS/ The corresponding source code package can be found at: ftp://ftp.calderaystems.com/pub/OpenLinux/updates/2.3/current/SRPMS/ 5. Installing Fixed Packages Upgrade the affected packages with the following commands: rpm -U wu-ftpd-2.5-2.i386.rpm 6. Verification b43db0110323aba3ab17daa1a2b5bbd6 RPMS/wu-ftpd-2.5.0-2.i386.rpm 23d39b4842dc985a5413874de97f9bc9 SRPMS/wu-ftpd-2.5.0-2.src.rpm 7. References This and other Caldera security resources are located at: http://www.calderasystems.com/news/security/index.html This security fix closes Caldera's internal Problem Report 5091 8. Disclaimer Caldera Systems, Inc. is not responsible for the misuse of any of the information we provide on this website and/or through our security advisories. Our advisories are a service to our customers intended to promote secure installation and use of Caldera OpenLinux. ______________________________________________________________________________ -----BEGIN PGP SIGNATURE----- Version: 2.6.3i Charset: noconv iQCVAwUBN8ZndOn+9R4958LpAQHxgAP/aLHh8cebB1S8Bx5qiDOZXUk8yATYPGUu QJNUuu+MPYEykZsbkulKlhccHbXJHTbEUzEq6ygDDScxvJ6JgjRoRBpodpkqqvOq GhqTdXcBN2bAZ1S4cuPOyytcuBZ2oeY9Iqifn8clmSeUPArFsDziCXBPk7abKazq TsywFUeqqCQ= =9Uqt -----END PGP SIGNATURE-----