1 |
-----BEGIN PGP SIGNED MESSAGE----- |
2 |
Hash: SHA1 |
3 |
|
4 |
- ------------------------------------------------------------------------ |
5 |
GENTOO LINUX SECURITY ANNOUNCEMENT 200309-16 |
6 |
- ------------------------------------------------------------------------ |
7 |
PACKAGE : net-ftp/proftpd |
8 |
SUMMARY : ASCII File Remote Compromise Vulnerability |
9 |
DATE : 2003-09-28 00:37 UTC |
10 |
EXPLOIT : remote |
11 |
VERSIONS AFFECTED : <proftpd-1.2.9_rc2 |
12 |
FIXED VERSION : =proftpd-1.2.9_rc2 |
13 |
GENTOO BUG ID : 29452 |
14 |
CVE : none that we are aware of at this time |
15 |
- ------------------------------------------------------------------------ |
16 |
|
17 |
SUMMARY: |
18 |
|
19 |
ISS X-Force discovered a vulnerability that could be triggered when a |
20 |
specially crafted file is uploaded to a proftpd server. |
21 |
|
22 |
Read the full advisory at: |
23 |
http://www.proftpd.org/ |
24 |
|
25 |
SOLUTION: |
26 |
|
27 |
It is recommended that all Gentoo Linux users who are running |
28 |
net-ftp/proftpd upgrade to proftpd-1.29_rc2 as follows |
29 |
|
30 |
emerge sync |
31 |
emerge '>=net-ftp/proftpd-1.2.9_rc2' |
32 |
emerge clean |
33 |
|
34 |
- - - --------------------------------------------------------------------- |
35 |
solar@g.o |
36 |
aliz@g.o - GnuPG key is available at http://dev.gentoo.org/~aliz |
37 |
- - - --------------------------------------------------------------------- |
38 |
|
39 |
-----BEGIN PGP SIGNATURE----- |
40 |
Version: GnuPG v1.2.3 (GNU/Linux) |
41 |
|
42 |
iD8DBQE/eEBbfT7nyhUpoZMRArDnAKCFlLbPmeC/S05/0EG1pqJc9BbClACgjPY6 |
43 |
OintOPB6pXf211OQxsUC7Tg= |
44 |
=+hmK |
45 |
-----END PGP SIGNATURE----- |