[prev in list] [next in list] [prev in thread] [next in thread]
List: bugtraq
Subject: [ MDKSA-2006:217-1 ] - Updated proftpd packages fix vulnerabilities
From: security () mandriva ! com
Date: 2006-11-30 18:21:00
Message-ID: E1GpqWq-0005CC-B3 () mercury ! mandriva ! com
[Download RAW message or body]
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
_______________________________________________________________________
Mandriva Linux Security Advisory MDKSA-2006:217-1
http://www.mandriva.com/security/
_______________________________________________________________________
Package : proftpd
Date : November 30, 2006
Affected: 2006.0, 2007.0, Corporate 3.0, Corporate 4.0
_______________________________________________________________________
Problem Description:
A stack-based buffer overflow in the sreplace function in ProFTPD 1.3.0
and earlier, allows remote attackers to cause a denial of service, as
demonstrated by vd_proftpd.pm, a "ProFTPD remote exploit."
(CVE-2006-5815)
Buffer overflow in the tls_x509_name_oneline function in the mod_tls
module, as used in ProFTPD 1.3.0a and earlier, and possibly other
products, allows remote attackers to execute arbitrary code via a large
data length argument, a different vulnerability than CVE-2006-5815.
(CVE-2006-6170)
ProFTPD 1.3.0a and earlier does not properly set the buffer size limit
when CommandBufferSize is specified in the configuration file, which
leads to an off-by-two buffer underflow. NOTE: in November 2006, the
role of CommandBufferSize was originally associated with CVE-2006-5815,
but this was an error stemming from an initial vague disclosure. NOTE:
ProFTPD developers dispute this issue, saying that the relevant memory
location is overwritten by assignment before further use within the
affected function, so this is not a vulnerability. (CVE-2006-6171)
Packages have been patched to correct these issues.
Update:
The previous update incorrectly linked the vd_proftd.pm issue with the
CommandBufferSize issue. These are two distinct issues and the previous
update only addressed CommandBufferSize (CVE-2006-6171), and the
mod_tls issue (CVE-2006-6170).
_______________________________________________________________________
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5815
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6170
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6171
_______________________________________________________________________
Updated Packages:
Mandriva Linux 2006.0:
b1cd1e2584e59418a20260b3f3332208 2006.0/i586/proftpd-1.2.10-13.3.20060mdk.i586.rpm
979d14f8aa6312dac64948e1e9445f33 \
2006.0/i586/proftpd-anonymous-1.2.10-13.3.20060mdk.i586.rpm \
1d446921049eb39f91f0450a0ff74018 2006.0/SRPMS/proftpd-1.2.10-13.3.20060mdk.src.rpm
Mandriva Linux 2006.0/X86_64:
80f43de2dcf0aab1956552ef2a93c1b5 \
2006.0/x86_64/proftpd-1.2.10-13.3.20060mdk.x86_64.rpm \
62862e2c1c5c870946406beb2b982237 \
2006.0/x86_64/proftpd-anonymous-1.2.10-13.3.20060mdk.x86_64.rpm \
1d446921049eb39f91f0450a0ff74018 2006.0/SRPMS/proftpd-1.2.10-13.3.20060mdk.src.rpm
Mandriva Linux 2007.0:
a37912e678d6dbfe2ed21a2c432e029c 2007.0/i586/proftpd-1.3.0-4.3mdv2007.0.i586.rpm
89b3d4beac485d4879295ad99a17cd1b \
2007.0/i586/proftpd-anonymous-1.3.0-4.3mdv2007.0.i586.rpm \
c206fc94fd81a8f79a158efe6e0fa8fb \
2007.0/i586/proftpd-mod_autohost-1.3.0-4.3mdv2007.0.i586.rpm \
6ba12b916446da7651ced303cd5c2f0a \
2007.0/i586/proftpd-mod_case-1.3.0-4.3mdv2007.0.i586.rpm \
a3d6b7c829345d6edf9f22efb8369b58 \
2007.0/i586/proftpd-mod_clamav-1.3.0-4.3mdv2007.0.i586.rpm \
a51a76a0e93f638018a15a28d67d1bc6 \
2007.0/i586/proftpd-mod_ctrls_admin-1.3.0-4.3mdv2007.0.i586.rpm \
458913aaa82dd80691b08e69c2d7a68e \
2007.0/i586/proftpd-mod_facl-1.3.0-4.3mdv2007.0.i586.rpm \
3e929da8229f69a9c2c8702f2c79bbfe \
2007.0/i586/proftpd-mod_gss-1.3.0-4.3mdv2007.0.i586.rpm \
9c7ad69945b176c59f682a750ba0da86 \
2007.0/i586/proftpd-mod_ifsession-1.3.0-4.3mdv2007.0.i586.rpm \
de0dd2a5354bdd79842c84dd0698ae80 \
2007.0/i586/proftpd-mod_ldap-1.3.0-4.3mdv2007.0.i586.rpm \
84255d9b701a430fdebc8ffa0804462d \
2007.0/i586/proftpd-mod_load-1.3.0-4.3mdv2007.0.i586.rpm \
5a9dea0cc961f50a772f0c7f6d04fb2c \
2007.0/i586/proftpd-mod_quotatab-1.3.0-4.3mdv2007.0.i586.rpm \
da44806b650245adadee9227d60fed35 \
2007.0/i586/proftpd-mod_quotatab_file-1.3.0-4.3mdv2007.0.i586.rpm \
c2fd38d0ab3e324e377a0a83449bdcfc \
2007.0/i586/proftpd-mod_quotatab_ldap-1.3.0-4.3mdv2007.0.i586.rpm \
db3864770f8aa649190e84ac04c7d26a \
2007.0/i586/proftpd-mod_quotatab_sql-1.3.0-4.3mdv2007.0.i586.rpm \
1f1a0e13808bfe3179c1142d2cfc76bd \
2007.0/i586/proftpd-mod_radius-1.3.0-4.3mdv2007.0.i586.rpm \
93f3736a42145559e9faffa16c68271d \
2007.0/i586/proftpd-mod_ratio-1.3.0-4.3mdv2007.0.i586.rpm \
ce6ce9b9340c328ff0956481fe9ee5ff \
2007.0/i586/proftpd-mod_rewrite-1.3.0-4.3mdv2007.0.i586.rpm \
8c7089d22b32a863691fcf1ff3c1b6bf \
2007.0/i586/proftpd-mod_shaper-1.3.0-4.3mdv2007.0.i586.rpm \
23b8d3f76708ce59d83bf07a6c19034d \
2007.0/i586/proftpd-mod_site_misc-1.3.0-4.3mdv2007.0.i586.rpm \
845b77cc6c4c2f4eb8c4a41d369afe3d \
2007.0/i586/proftpd-mod_sql-1.3.0-4.3mdv2007.0.i586.rpm \
7d98b511040ce3a9c16ca38fad98cdc7 \
2007.0/i586/proftpd-mod_sql_mysql-1.3.0-4.3mdv2007.0.i586.rpm \
44bdd048bac956a52adae56b429419a8 \
2007.0/i586/proftpd-mod_sql_postgres-1.3.0-4.3mdv2007.0.i586.rpm \
bece7d223e81935362115874debc625f \
2007.0/i586/proftpd-mod_time-1.3.0-4.3mdv2007.0.i586.rpm \
b655b11679c1d46750397f647499d113 \
2007.0/i586/proftpd-mod_tls-1.3.0-4.3mdv2007.0.i586.rpm \
f051af523f306a8547cc232df6af61b0 \
2007.0/i586/proftpd-mod_wrap-1.3.0-4.3mdv2007.0.i586.rpm \
ea415328f16a7c86c530b1628e9e7119 \
2007.0/i586/proftpd-mod_wrap_file-1.3.0-4.3mdv2007.0.i586.rpm \
40cc7355b7baea00dc0ca3d9fbb23d54 \
2007.0/i586/proftpd-mod_wrap_sql-1.3.0-4.3mdv2007.0.i586.rpm \
56f9c85b919e81120ef5c9f95c5fbb70 2007.0/SRPMS/proftpd-1.3.0-4.3mdv2007.0.src.rpm
Mandriva Linux 2007.0/X86_64:
a3f7f06d36e939decedbfbd73b068a00 \
2007.0/x86_64/proftpd-1.3.0-4.3mdv2007.0.x86_64.rpm e57974563e6a6a856997ece7ae4223f3 \
2007.0/x86_64/proftpd-anonymous-1.3.0-4.3mdv2007.0.x86_64.rpm \
351f1bcb4148bb3e2d42e4f8b63866bb \
2007.0/x86_64/proftpd-mod_autohost-1.3.0-4.3mdv2007.0.x86_64.rpm \
5244e4fe2899727b8ed9ff8c2108e835 \
2007.0/x86_64/proftpd-mod_case-1.3.0-4.3mdv2007.0.x86_64.rpm \
6945e72c1af1e29f0e8a4f851fde7c04 \
2007.0/x86_64/proftpd-mod_clamav-1.3.0-4.3mdv2007.0.x86_64.rpm \
eaeba816574a28d65c243d70c55a2be7 \
2007.0/x86_64/proftpd-mod_ctrls_admin-1.3.0-4.3mdv2007.0.x86_64.rpm \
4b61ef08a72e13acf1c245efda94e14d \
2007.0/x86_64/proftpd-mod_facl-1.3.0-4.3mdv2007.0.x86_64.rpm \
599338063d6b3358c92bc675748a5276 \
2007.0/x86_64/proftpd-mod_gss-1.3.0-4.3mdv2007.0.x86_64.rpm \
113e48693e6f717523f53d7bd362f167 \
2007.0/x86_64/proftpd-mod_ifsession-1.3.0-4.3mdv2007.0.x86_64.rpm \
0afda1fa0eb473074bbf591b87c205f5 \
2007.0/x86_64/proftpd-mod_ldap-1.3.0-4.3mdv2007.0.x86_64.rpm \
d5f67ae4a0057ac1574446d53a2b01c2 \
2007.0/x86_64/proftpd-mod_load-1.3.0-4.3mdv2007.0.x86_64.rpm \
24598aaa7594f1c3cce8104c0691fd89 \
2007.0/x86_64/proftpd-mod_quotatab-1.3.0-4.3mdv2007.0.x86_64.rpm \
ae6875064975d76b2f2ce5c2cee3c4cf \
2007.0/x86_64/proftpd-mod_quotatab_file-1.3.0-4.3mdv2007.0.x86_64.rpm \
a383a4b78ec3e492563c9ef542c2a701 \
2007.0/x86_64/proftpd-mod_quotatab_ldap-1.3.0-4.3mdv2007.0.x86_64.rpm \
eccf357b396c651538df038d7c480516 \
2007.0/x86_64/proftpd-mod_quotatab_sql-1.3.0-4.3mdv2007.0.x86_64.rpm \
0b41852744c4493629eb1d71c8091c8a \
2007.0/x86_64/proftpd-mod_radius-1.3.0-4.3mdv2007.0.x86_64.rpm \
93d8f354acd5a7e25478b9bbd3319617 \
2007.0/x86_64/proftpd-mod_ratio-1.3.0-4.3mdv2007.0.x86_64.rpm \
332c8e76e5a93e5011caeb3fbf9d8d7d \
2007.0/x86_64/proftpd-mod_rewrite-1.3.0-4.3mdv2007.0.x86_64.rpm \
03aed52b479f6bf0affa3a697aebe47d \
2007.0/x86_64/proftpd-mod_shaper-1.3.0-4.3mdv2007.0.x86_64.rpm \
4ea161e9f3821a3f90a2e19f22fdb487 \
2007.0/x86_64/proftpd-mod_site_misc-1.3.0-4.3mdv2007.0.x86_64.rpm \
ef8473f399c9fab49b174438e9f57f1a \
2007.0/x86_64/proftpd-mod_sql-1.3.0-4.3mdv2007.0.x86_64.rpm \
e77455dd400984b833dd3bf52b6c9876 \
2007.0/x86_64/proftpd-mod_sql_mysql-1.3.0-4.3mdv2007.0.x86_64.rpm \
b194fe453ab8f2d900f49a8fee4d8a43 \
2007.0/x86_64/proftpd-mod_sql_postgres-1.3.0-4.3mdv2007.0.x86_64.rpm \
26177d8de2b31e25d54458f125a4bef6 \
2007.0/x86_64/proftpd-mod_time-1.3.0-4.3mdv2007.0.x86_64.rpm \
27cab8a3a4bf0162e4e4aeb8f2235c18 \
2007.0/x86_64/proftpd-mod_tls-1.3.0-4.3mdv2007.0.x86_64.rpm \
0eebacf7e2aacf1893e6f077a05deade \
2007.0/x86_64/proftpd-mod_wrap-1.3.0-4.3mdv2007.0.x86_64.rpm \
e1c973141f23a99f1a1e5cfad06ba507 \
2007.0/x86_64/proftpd-mod_wrap_file-1.3.0-4.3mdv2007.0.x86_64.rpm \
ea8918c00be656f8c5c1be6e7e5c29cc \
2007.0/x86_64/proftpd-mod_wrap_sql-1.3.0-4.3mdv2007.0.x86_64.rpm \
56f9c85b919e81120ef5c9f95c5fbb70 2007.0/SRPMS/proftpd-1.3.0-4.3mdv2007.0.src.rpm
Corporate 3.0:
05c8ada8f0f64c13e392bacea28a57c3 \
corporate/3.0/i586/proftpd-1.2.9-3.6.C30mdk.i586.rpm \
38d0c4fb80b8511d4fc60e29b76c2329 \
corporate/3.0/i586/proftpd-anonymous-1.2.9-3.6.C30mdk.i586.rpm \
fd2a42044333ba3528899e65e6028b28 \
corporate/3.0/SRPMS/proftpd-1.2.9-3.6.C30mdk.src.rpm
Corporate 3.0/X86_64:
c76e71ec99c373b351a69b33d09e0328 \
corporate/3.0/x86_64/proftpd-1.2.9-3.6.C30mdk.x86_64.rpm \
6a7866fb417a3ba020caad45f7696a1d \
corporate/3.0/x86_64/proftpd-anonymous-1.2.9-3.6.C30mdk.x86_64.rpm \
fd2a42044333ba3528899e65e6028b28 \
corporate/3.0/SRPMS/proftpd-1.2.9-3.6.C30mdk.src.rpm
Corporate 4.0:
3a74dd621c2836818d884faa26577379 \
corporate/4.0/i586/proftpd-1.2.10-20.3.20060mlcs4.i586.rpm \
75fa75338ed57f5d0aeb137ca7efe521 \
corporate/4.0/i586/proftpd-anonymous-1.2.10-20.3.20060mlcs4.i586.rpm \
f2f48f3379be27c86e4edc1a9cb53d53 \
corporate/4.0/SRPMS/proftpd-1.2.10-20.3.20060mlcs4.src.rpm
Corporate 4.0/X86_64:
b2e043f4ad4b4045ae0f09074be55327 \
corporate/4.0/x86_64/proftpd-1.2.10-20.3.20060mlcs4.x86_64.rpm \
8524b1da761c3f24f3b0dd0d9a0139b7 \
corporate/4.0/x86_64/proftpd-anonymous-1.2.10-20.3.20060mlcs4.x86_64.rpm \
f2f48f3379be27c86e4edc1a9cb53d53 \
corporate/4.0/SRPMS/proftpd-1.2.10-20.3.20060mlcs4.src.rpm \
_______________________________________________________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
_______________________________________________________________________
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.2 (GNU/Linux)
iD8DBQFFbvOPmqjQ0CJFipgRAmJmAKDyLo9c1K07oSdMIIpg9FVJk8JiNwCfcBcw
E/A+IqwCWvS6eomzGIkUeMk=
=BufZ
-----END PGP SIGNATURE-----
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic