Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> SuSE Local Security Checks >> SUSE-SA:2003:032: wuftpd


Vulnerability Assessment Details

SUSE-SA:2003:032: wuftpd

Vulnerability Assessment Summary
Check for the version of the wuftpd package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory SUSE-SA:2003:032 (wuftpd).


Janusz Niewiadomski and Wojciech Purczynski of iSEC Security Research
have found a single byte buffer overflow in the Washington University
ftp daemon (wuftpd), a widely used ftp server for Linux-like systems.
It is yet unclear if this bug is (remotely) exploitable. Positive
exploitability may result in a remote root compromise of a system
running the wuftpd ftp daemon.

Notes:
* SUSE LINUX products do not contain wuftpd any more starting with SUSE
Linux 8.0 and SUSE LINUX Enterprise Server 8. The wuftpd package has
been substituted by a different server implementation of the file
transfer protocol server.
* The affected wuftpd packages in products as stated in the header of
this announcement actually ship two different wuftpd ftp daemon
versions: The older version 2.4.x that is installed as
/usr/sbin/wu.ftpd, the newer version 2.6 is installed as
/usr/sbin/wu.ftpd-2.6 . The 2.4.x version does not contain the
defective parts of the code and is therefore not vulnerable to the
weakness found.
* If you are using the wuftpd ftp daemon in version 2.4.x, you might
want to update the package anyway in order not to risk an insecure
configuration once you switch to the newer version.

There exists no workaround that can fix this vulnerability on a temporary
basis other than just using the 2.4.x version as mentioned above.
The proper fix for the weakness is to update the package using the
provided update packages.

Please download the update package for your distribution and verify its
integrity by the methods listed in section 3) of this announcement.
Then, install the package using the command 'rpm -Fhv file.rpm' to apply
the update.

Solution : http://www.suse.de/security/2003_032_wuftpd.html
Network Security Threat Level: High

Networks Security ID: 8315

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security

Cables, Connectors


Vintage Passport MIDI Interface For Macintosh Mac Apple picture

Vintage Passport MIDI Interface For Macintosh Mac Apple

$20.00



Vintage Gateway Solo2150 Laptop - Windows 98 Era picture

Vintage Gateway Solo2150 Laptop - Windows 98 Era

$40.00



Vintage AST Ascentia 900N 4/50 CS10 Notebook UNTESTED no cables  picture

Vintage AST Ascentia 900N 4/50 CS10 Notebook UNTESTED no cables

$29.99



Intel Celeron 300 333 MHz SL2YP SL2X8 SL2WN SL2WN SL2Y2 vintage CPU GOLD picture

Intel Celeron 300 333 MHz SL2YP SL2X8 SL2WN SL2WN SL2Y2 vintage CPU GOLD

$10.95



Vintage Farallon Netopia Unit picture

Vintage Farallon Netopia Unit

$48.00



Vintage Packard Bell 14

Vintage Packard Bell 14" XGA 1024x768 CRT Monitor PB8549SVGL - Works Retro 90s

$50.00



AT Tower Computer Case, MEV 120 HX, CLEANED Vintage For 386/486/Pentium, READ picture

AT Tower Computer Case, MEV 120 HX, CLEANED Vintage For 386/486/Pentium, READ

$99.99



Vintage Compaq 141649-004 2 Button PS/2 Gray Mouse M-S34 - FAST SHIPPING - NEW picture

Vintage Compaq 141649-004 2 Button PS/2 Gray Mouse M-S34 - FAST SHIPPING - NEW

$8.99



Vintage Comfort Keyboard Systems Ergomagic Mechanical AT/PS2 Keyboard picture

Vintage Comfort Keyboard Systems Ergomagic Mechanical AT/PS2 Keyboard

$149.99



Vintage Polaroid PolaPrinter Slide Copier model 3510 duplicator multi volt picture

Vintage Polaroid PolaPrinter Slide Copier model 3510 duplicator multi volt

$37.99



Discussions

No Discussions have been posted on this vulnerability.