[12312] in bugtraq

home help back first fref pref prev next nref lref last post

Re: CERT Advisory CA-99.13 - Multiple Vulnerabilities in WU-FTPD

daemon@ATHENA.MIT.EDU (Chad Price)
Thu Oct 21 19:34:29 1999

Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"; format=flowed
Message-Id:  <4.2.0.58.19991021130924.00bcdf00@137.197.214.37>
Date:         Thu, 21 Oct 1999 13:11:32 -0500
Reply-To: Chad Price <cprice@MOLBIO.UNMC.EDU>
From: Chad Price <cprice@MOLBIO.UNMC.EDU>
X-To:         trott@SLOWPOISONERS.COM
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  <Pine.BSO.4.10.9910201511280.26798-100000@www>

I noticed that also; however the release of 2.6.0 and the CERT advisory (as
well as the AUSCERT advisory) were in fact closely coordinated.  This is
because 2.6.0 does fix all the items listed in the advisory.

At 03:16 PM 10/20/1999 -0700, you wrote:
> > WU-FTPD and BeroFTPD
> >
> >    Vulnerability #1:
> >
> >    Not vulnerable:
> >           versions 2.4.2 and all betas and earlier versions
> >           Vulnerable:
> >           wu-ftpd-2.4.2-beta-18-vr4 through wu-ftpd-2.4.2-beta-18-vr15
> >           wu-ftpd-2.4.2-vr16 and wu-ftpd-2.4.2-vr17
> >           wu-ftpd-2.5.0
> >           BeroFTPD, all versions
>
>CERT appears to have left out wu-ftpd-2.6.0 (although they included it in
>the lists for the other two vulnerabilities).
>
>Version 2.6.0 does *not* have the "MAPPING_CHDIR Buffer Overflow"
>vulnerability, at least if the ANNOUNCE-RELEASE file for that version is
>to be believed.  It reads, in part:
>
>"Corrected an error in the MAPPING_CHDIR feature which could be used to
>gain root privileges on the server."
>
>Presumably, this refers to this vulnerability.
>
>Rich

Chad Price
Systems Manager, Genetic Sequence Analysis Facility
University of Nebraska Medical Center
986495 Nebraska Medical Center
Omaha, NE 68506-6495
cprice@molbio.unmc.edu
(402) 559-9527
(402) 559-4077 (FAX)

home help back first fref pref prev next nref lref last post