Gentoo Archives: gentoo-announce

From: Raphael Marichez <falco@g.o>
To: gentoo-announce@g.o
Cc: bugtraq@×××××××××××××.com, full-disclosure@××××××××××××××.uk, security-alerts@×××××××××××××.com
Subject: [gentoo-announce] [ GLSA 200702-02 ] ProFTPD: Local privilege escalation
Date: Tue, 13 Feb 2007 23:20:32
Message-Id: 20070213224924.GE10207@falco.falcal.net
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 200702-02
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 http://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: High
8 Title: ProFTPD: Local privilege escalation
9 Date: February 13, 2007
10 Bugs: #158122
11 ID: 200702-02
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 A flaw in ProFTPD may allow a local attacker to obtain root privileges.
19
20 Background
21 ==========
22
23 ProFTPD is a powerful, configurable, and free FTP daemon.
24
25 Affected packages
26 =================
27
28 -------------------------------------------------------------------
29 Package / Vulnerable / Unaffected
30 -------------------------------------------------------------------
31 1 net-ftp/proftpd < 1.3.1_rc1 >= 1.3.1_rc1
32
33 Description
34 ===========
35
36 A flaw exists in the mod_ctrls module of ProFTPD, normally used to
37 allow FTP server administrators to configure the daemon at runtime.
38
39 Impact
40 ======
41
42 An FTP server administrator permitted to interact with mod_ctrls could
43 potentially compromise the ProFTPD process and execute arbitrary code
44 with the privileges of the FTP Daemon, which is normally the root user.
45
46 Workaround
47 ==========
48
49 Disable mod_ctrls, or ensure only trusted users can access this
50 feature.
51
52 Resolution
53 ==========
54
55 All ProFTPD users should upgrade to the latest version:
56
57 # emerge --sync
58 # emerge --ask --oneshot --verbose ">=net-ftp/proftpd-1.3.1_rc1"
59
60 References
61 ==========
62
63 [ 1 ] CVE-2006-6563
64 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6563
65
66 Availability
67 ============
68
69 This GLSA and any updates to it are available for viewing at
70 the Gentoo Security Website:
71
72 http://security.gentoo.org/glsa/glsa-200702-02.xml
73
74 Concerns?
75 =========
76
77 Security is a primary focus of Gentoo Linux and ensuring the
78 confidentiality and security of our users machines is of utmost
79 importance to us. Any security concerns should be addressed to
80 security@g.o or alternatively, you may file a bug at
81 http://bugs.gentoo.org.
82
83 License
84 =======
85
86 Copyright 2007 Gentoo Foundation, Inc; referenced text
87 belongs to its owner(s).
88
89 The contents of this document are licensed under the
90 Creative Commons - Attribution / Share Alike license.
91
92 http://creativecommons.org/licenses/by-sa/2.5