|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> SuSE Local Security Checks >> SUSE-SA:2003:032: wuftpd Vulnerability Assessment Details
|
SUSE-SA:2003:032: wuftpd |
||
Check for the version of the wuftpd package Detailed Explanation for this Vulnerability Assessment The remote host is missing the patch for the advisory SUSE-SA:2003:032 (wuftpd). Janusz Niewiadomski and Wojciech Purczynski of iSEC Security Research have found a single byte buffer overflow in the Washington University ftp daemon (wuftpd), a widely used ftp server for Linux-like systems. It is yet unclear if this bug is (remotely) exploitable. Positive exploitability may result in a remote root compromise of a system running the wuftpd ftp daemon. Notes: * SUSE LINUX products do not contain wuftpd any more starting with SUSE Linux 8.0 and SUSE LINUX Enterprise Server 8. The wuftpd package has been substituted by a different server implementation of the file transfer protocol server. * The affected wuftpd packages in products as stated in the header of this announcement actually ship two different wuftpd ftp daemon versions: The older version 2.4.x that is installed as /usr/sbin/wu.ftpd, the newer version 2.6 is installed as /usr/sbin/wu.ftpd-2.6 . The 2.4.x version does not contain the defective parts of the code and is therefore not vulnerable to the weakness found. * If you are using the wuftpd ftp daemon in version 2.4.x, you might want to update the package anyway in order not to risk an insecure configuration once you switch to the newer version. There exists no workaround that can fix this vulnerability on a temporary basis other than just using the 2.4.x version as mentioned above. The proper fix for the weakness is to update the package using the provided update packages. Please download the update package for your distribution and verify its integrity by the methods listed in section 3) of this announcement. Then, install the package using the command 'rpm -Fhv file.rpm' to apply the update. Solution : http://www.suse.de/security/2003_032_wuftpd.html Network Security Threat Level: High Networks Security ID: 8315 Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security |
||
Cables, Connectors |
Supermicro 1U Server PFSENSE X11SSW-4TF Xeon 3.5Ghz V6 32G RAM 4x 10GBE M.2 NVME
$229.00
Dell Poweredge R730xd 24SFF 2x E5-2660 v3 2.6ghz 64gb H730 24x Trays 2x 750w
$294.99
Dell Poweredge R630 2x Xeon E5-2680 v3 2.5ghz 24-Cores 32gb 240GB SSD 495w
$164.99
Dell PowerEdge R730 3.5 8 Bay w Trays 128Gb RAM 2x12c CPUs 80GbSSD/2x4Tb Proxmox
$430.00
Supermicro 4U 36 Bay TRUNAS Storage Server Xeon 20 Cores 256GB Ram X520 10G SFP+
$488.00
DELL POWEREDGE R630 8SFF 2x 14 CORE E5-2660V4 2.0GHz 16GB RAM 2x 500GB SATA S130
$180.00
Dell EMC PowerEdge R740XD J0T3G 18x LFF CTO Server W/ 2x CMPGM 1x 0WGD1 1x 6VDPG
$549.00
Dell PowerEdge R630 Server 8 Bay - Pick RAM Drives RAID PSUs - All Inc 2x12c CPU
$360.00
Dell Poweredge R630 2x Xeon E5-2680 v3 2.5ghz 24-Cores / 32gb / Raid / 2x 1Tb
$179.99
Dell PowerEdge R710 8SFF 2U Server 2x X5680 3.33GHZ 12-Cores / 128gb / 2x Trays
$184.99
|
||
No Discussions have been posted on this vulnerability. |