Debian Security Advisory DSA-055-1 - The gftp package has a problem in its logging code which allows malicious ftp servers to execute commands on the client machine. This has been fixed in version 2.0.6a-3.1.
298107ba14642c6d63372744b8b8563c74b01a97174ddea28e973a233b9425d8
-----BEGIN PGP SIGNED MESSAGE-----
- ------------------------------------------------------------------------
Debian Security Advisory DSA-055-1 security@debian.org
http://www.debian.org/security/ Wichert Akkerman
May 8, 2001
- ------------------------------------------------------------------------
Package : gftp
Problem type : printf format attack
Debian-specific: no
The gftp package as distributed with Debian GNU/Linux 2.2 has a problem
in its logging code: it logged data received from the network but it did
not protect itself from printf format attacks. An attacker can use this
by making a FTP server return special responses that exploit this.
This has been fixed in version 2.0.6a-3.1, and we recommend that you
upgrade your gftp package.
wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
Debian GNU/Linux 2.2 alias potato
- ---------------------------------
Potato was released for alpha, arm, i386, m68k, powerpc and sparc.
Source archives:
http://security.debian.org/dists/stable/updates/main/source/gftp_2.0.6a-3.1.diff.gz
MD5 checksum: 23df5107a21eaa36b3dcc50367bd3b46
http://security.debian.org/dists/stable/updates/main/source/gftp_2.0.6a-3.1.dsc
MD5 checksum: b99704d17c10b1f2bbbb80d430b55d21
http://security.debian.org/dists/stable/updates/main/source/gftp_2.0.6a.orig.tar.gz
MD5 checksum: 8eba39ab947712b46756b4e014b72e8c
Alpha architecture:
http://security.debian.org/dists/stable/updates/main/binary-alpha/gftp_2.0.6a-3.1_alpha.deb
MD5 checksum: 7df9efccb67296eb2df1e070e66add80
ARM architecture:
http://security.debian.org/dists/stable/updates/main/binary-arm/gftp_2.0.6a-3.1_arm.deb
MD5 checksum: 2d701b8c6c4f5e05ca8664a65cf2e8d3
Intel ia32 architecture:
http://security.debian.org/dists/stable/updates/main/binary-i386/gftp_2.0.6a-3.1_i386.deb
MD5 checksum: 71b547eec5c5e24f9dca56882b5fbf8a
Motorola 680x0 architecture:
http://security.debian.org/dists/stable/updates/main/binary-m68k/gftp_2.0.6a-3.1_m68k.deb
MD5 checksum: 4f824249dd40ed70ba3f373cbad1a790
PowerPC architecture:
http://security.debian.org/dists/stable/updates/main/binary-powerpc/gftp_2.0.6a-3.1_powerpc.deb
MD5 checksum: 12d5e7b0b433d9eeefef48c31786ee83
Sun Sparc architecture:
http://security.debian.org/dists/stable/updates/main/binary-sparc/gftp_2.0.6a-3.1_sparc.deb
MD5 checksum: c0de4c7a87d2dbb153bc6a67530ac0cc
These packages will be moved into the stable distribution on its next
revision.
For not yet released architectures please refer to the appropriate
directory ftp://ftp.debian.org/debian/dists/sid/binary-$arch/ .
- --
- ----------------------------------------------------------------------------
apt-get: deb http://security.debian.org/ stable/updates main
dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
Version: 2.6.3ia
Charset: noconv
iQB1AwUBOvf6yqjZR/ntlUftAQHTgwMArHoh8VLWNq5qhnuMu8R+PvIG5lk4HIu0
IszAShUmoQsOWhVLfXtnyHZO5+ljRHixnxfS5P7A8aAhYi15i9ZvVSXGtjeOEp3m
l6ZTypVhKvNPW/fuZzpLIVvA9bgj06nr
=Iym9
-----END PGP SIGNATURE-----
--
To UNSUBSCRIBE, email to debian-security-announce-request@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org