---

Red Hat Security Advisory: Buffer overflow security problem in the proftpd daemon

Red Hat Security Advisory

Package:   proftpd
Synopsis:       Buffer overflow in proftpd
Advisory ID:    RHSA-1999:034-01
Issue Date:     1999-08-31
Updated on:
Keywords:       proftpd buffer overflow remote exploit

1. Topic:
proftpd is a ftp server that is shipped by Red Hat as part of the
Powertools CD collection. It is not enabled nor installed by
default. However, if you have switched to proftpd and you are using
the version shipped on the Red Hat Powertoold 6.0 CD you are at
risk.

2. Bug IDs fixed:
N/A

3. Relevant releases/architectures:
Red Hat Linux 6.0, all architectures

4. Obsoleted by:
None

5. Conflicts with:
None

6. RPMs required:

Intel:

ftp://updates.redhat.com/6.0/i386/

proftpd-1.2.0pre3-6.i386.rpm

Alpha:

ftp://updates.redhat.com/6.0/alpha

proftpd-1.2.0pre3-6.alpha.rpm

SPARC:

ftp://updates.redhat.com/6.0/sparc

proftpd-1.2.0pre3-6.sparc.rpm

Source:

fftp://updates.redhat.com/6.0/SRPMS

proftpd-1.2.0pre3-6.src.rpm

Architecture neutral:

ftp://updates.redhat.com/6.0/noarch/

7. Problem description:
An explotable buffer overflow security problem in the proftpd
daemon has been fixed. The vulnerability is actively exploited on
the Internet and site administrators are stronly advised to upgrade
to the new packages.

Thanks to the members of the BUGTRAQ mailing list and Nic
Bellamy for providing a fix.

8. Solution:
For each RPM for your particular architecture, run:

rpm -Uvh filename

where filename is the name of the RPM.

Then restart inetd by typing:

/etc/rc.d/init.d/inet restart

9. Verification:

   MD5 sum                           Package Name
  71dfdb94daea8b6f043016ff25d80ccc  i386/proftpd-1.2.0pre3-6.i386.rpm
  a8f2d44de9fb5607c5a43c761af5f1a2  alpha/proftpd-1.2.0pre3-6.alpha.rpm
  9091ad2a484b85263576c4a6b3c8b4ab  sparc/proftpd-1.2.0pre3-6.sparc.rpm
  5e374a647f6fd104046b726bf221b3cd  SRPMS/proftpd-1.2.0pre3-6.src.rpm

These packages are also PGP signed by Red Hat Inc. for security.
Our key is available at:
http://www.redhat.com/corp/contact.html

You can verify each package with the following command:

rpm –checksig filename

If you only wish to verify that each package has not been
corrupted or tampered with, examine only the md5sum with the
following command:

rpm –checksig –nopgp filename

10. References: