Red Hat Security Advisory
Package: proftpd Synopsis: Buffer overflow in proftpd Advisory ID: RHSA-1999:034-01 Issue Date: 1999-08-31 Updated on: Keywords: proftpd buffer overflow remote exploit
1. Topic:
proftpd is a ftp server that is shipped by Red Hat as part of the
Powertools CD collection. It is not enabled nor installed by
default. However, if you have switched to proftpd and you are using
the version shipped on the Red Hat Powertoold 6.0 CD you are at
risk.
2. Bug IDs fixed:
N/A
3. Relevant releases/architectures:
Red Hat Linux 6.0, all architectures
4. Obsoleted by:
None
5. Conflicts with:
None
6. RPMs required:
Intel:
ftp://updates.redhat.com/6.0/i386/
proftpd-1.2.0pre3-6.i386.rpm
Alpha:
ftp://updates.redhat.com/6.0/alpha
proftpd-1.2.0pre3-6.alpha.rpm
SPARC:
ftp://updates.redhat.com/6.0/sparc
proftpd-1.2.0pre3-6.sparc.rpm
Source:
fftp://updates.redhat.com/6.0/SRPMS
proftpd-1.2.0pre3-6.src.rpm
Architecture neutral:
ftp://updates.redhat.com/6.0/noarch/
7. Problem description:
An explotable buffer overflow security problem in the proftpd
daemon has been fixed. The vulnerability is actively exploited on
the Internet and site administrators are stronly advised to upgrade
to the new packages.
Thanks to the members of the BUGTRAQ mailing list and Nic
Bellamy for providing a fix.
8. Solution:
For each RPM for your particular architecture, run:
rpm -Uvh filename
where filename is the name of the RPM.
Then restart inetd by typing:
/etc/rc.d/init.d/inet restart
9. Verification:
MD5 sum Package Name 71dfdb94daea8b6f043016ff25d80ccc i386/proftpd-1.2.0pre3-6.i386.rpm a8f2d44de9fb5607c5a43c761af5f1a2 alpha/proftpd-1.2.0pre3-6.alpha.rpm 9091ad2a484b85263576c4a6b3c8b4ab sparc/proftpd-1.2.0pre3-6.sparc.rpm 5e374a647f6fd104046b726bf221b3cd SRPMS/proftpd-1.2.0pre3-6.src.rpm
These packages are also PGP signed by Red Hat Inc. for security.
Our key is available at:
http://www.redhat.com/corp/contact.html
You can verify each package with the following command:
rpm –checksig filename
If you only wish to verify that each package has not been
corrupted or tampered with, examine only the md5sum with the
following command:
rpm –checksig –nopgp filename
10. References: