[15625] in bugtraq
Re: [slackware-security] wu-ftpd remote exploit patched
daemon@ATHENA.MIT.EDU (jim)
Wed Jul 5 17:41:24 2000
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Message-ID: <Pine.LNX.3.96.1000704112336.27080B-100000@madeira.physiol.ucl.ac.uk>
Date: Tue, 4 Jul 2000 11:27:06 +0100
Reply-To: jim <jim@madeira.physiol.ucl.ac.uk>
From: jim <jim@madeira.physiol.ucl.ac.uk>
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To: <Pine.LNX.3.96.1000630140339.3058A-100000@madeira.physiol.ucl.ac.uk>
On Fri, 30 Jun 2000, jim wrote:
> It would appear though, that the _source_ for wu-ftpd, at least that in
> the Slackware 7.1 source iso (md5sum 6f2dd5c32b82e71f9970074e8d9681f0) has
> not been patched. Those of us who build Slackware components from source
> should be aware of this and patch manually.
I've now received clarification from the Slackware guys; there is an
updated 7.1 source.iso which has been patched but might not have made it
to all the mirror sites yet. The md5 sum you are looking for is
c0fddaaa5efeaef9403dc7071bc00119 . Those who downloaded from a mirror site
and got the first sum will still need to patch, of course. My apologies to
Slackware for any confusion caused.
jim
--
http://madeira.physiol.ucl.ac.uk/people/jim/
"Revenge is an integral part of forgiving and forgetting" -The BOFH