English | Deutsch | Español | Português
 UserID:
 Passwd:
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
 Vulnerability   
Search   
    Search 61204 CVE descriptions
and 32582 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 --------------------------------------------------------------------------
   Turbolinux Security Advisory TLSA-2003-54
   http://www.turbolinux.com/security/
                                             security-team@turbolinux.co.jp
 --------------------------------------------------------------------------

 Original released date : 30 Sep 2003
 Last revised           : 30 Sep 2003

 Package : proftpd

 Summary : ASCII File Remote Compromise Vulnerability

 More information :
    ProFTPD grew out of the desire to have a secure and configurable FTP server,
    and out of a significant admiration of the Apache web server.
    There are currently a very limited number of FTP servers running on Unix (or Unix-like) hosts. 
    A vulnerability exists in the ProFTPD server that can be triggered by
    remote attackers when transferring files from the FTP server in ASCII mode.
    The attacker must have the ability to upload a file to the server,
    and then attempt to download the same file to trigger the vulnerability.

 Impact :
    This vulnerability may allow a remote attacker to execute arbitrary code.

 Affected Products :
    - Turbolinux 8 Server
    - Turbolinux 8 Workstation
    - Turbolinux 7 Server
    - Turbolinux 7 Workstation
    - Turbolinux Server 6.5


 Solution :
    Please use turbopkg(zabom) tool to apply the update.
 ---------------------------------------------
 # turbopkg
 or
 # zabom update proftpd
 ---------------------------------------------


 <Turbolinux 8 Server>

   Source Packages
   Size : MD5

   ftp://ftp.turbolinux.com/pub/TurboLinux/TurboLinux/ia32/Server/8/updates/SRPMS/proftpd-1.2.8-3.src.rpm
       799310 0b085b2534d2ef187190e28c0d3c82b0

   Binary Packages
   Size : MD5

   ftp://ftp.turbolinux.com/pub/TurboLinux/TurboLinux/ia32/Server/8/updates/RPMS/proftpd-1.2.8-3.i586.rpm
       494255 41ef87d4add81c3e9b6b5798f0f5e53b

 <Turbolinux 8 Workstation>

   Source Packages
   Size : MD5

   ftp://ftp.turbolinux.com/pub/TurboLinux/TurboLinux/ia32/Workstation/8/updates/SRPMS/proftpd-1.2.8-3.src.rpm
       799310 c7c4ba58a0f45c9aa9ec37e71415683d

   Binary Packages
   Size : MD5

   ftp://ftp.turbolinux.com/pub/TurboLinux/TurboLinux/ia32/Workstation/8/updates/RPMS/proftpd-1.2.8-3.i586.rpm
       494317 aff059772cb4e8a83626165af3c2c918

 <Turbolinux 7 Server>

   Source Packages
   Size : MD5

   ftp://ftp.turbolinux.com/pub/TurboLinux/TurboLinux/ia32/Server/7/updates/SRPMS/proftpd-1.2.8-3.src.rpm
       799310 725dc29f67cab5fa77a236154033b3c7

   Binary Packages
   Size : MD5

   ftp://ftp.turbolinux.com/pub/TurboLinux/TurboLinux/ia32/Server/7/updates/RPMS/proftpd-1.2.8-3.i586.rpm
       486609 fc1a2b813257322095e6303dc4c27799

 <Turbolinux 7 Workstation>

   Source Packages
   Size : MD5

   ftp://ftp.turbolinux.com/pub/TurboLinux/TurboLinux/ia32/Workstation/7/updates/SRPMS/proftpd-1.2.8-3.src.rpm
       799310 a3d08e2e400f57b66fd7c2022abd1d09

   Binary Packages
   Size : MD5

   ftp://ftp.turbolinux.com/pub/TurboLinux/TurboLinux/ia32/Workstation/7/updates/RPMS/proftpd-1.2.8-3.i586.rpm
       486725 67f5f2f278a25548fd5424d5c481e151

 <Turbolinux Server 6.5>

   Source Packages
   Size : MD5

   ftp://ftp.turbolinux.com/pub/TurboLinux/TurboLinux/ia32/Server/6.5/updates/SRPMS/proftpd-1.2.8-3.src.rpm
       799310 28b82c94e03161660db0a061e272b3cd

   Binary Packages
   Size : MD5

   ftp://ftp.turbolinux.com/pub/TurboLinux/TurboLinux/ia32/Server/6.5/updates/RPMS/proftpd-1.2.8-3.i386.rpm
       597007 830ce6d43eefabe6f52333fd34d52a98


 Notice :
    After performing the update, it is necessary to restart the proftpd daemon.
    To do this, run the following command as user root.
 ---------------------------------------------
 # /etc/init.d/proftpd restart
 or
 # /etc/rc.d/init.d/proftpd restart
 ---------------------------------------------


 References :

 ProFTPD org
   [News Flashes]
   http://www.proftpd.org/index.html

 CVE
   [CAN-2003-0831]
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0831


 --------------------------------------------------------------------------
 Revision History
    30 Sep 2003 Initial release
 --------------------------------------------------------------------------

 Copyright(C) 2003 Turbolinux, Inc. All rights reserved. 

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.3 (GNU/Linux)

iD8DBQE/eUHzK0LzjOqIJMwRAkutAJ48MWzIVcdN8VF10ew9KuL6Sy39iACeL7PQ
zHsgltpx2DCJeiI6HpJyZac=
=8pPG
-----END PGP SIGNATURE-----

New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
   Privacy
Registered User Login
 
UserID:   
Passwd:  

 Forgot userid or passwd?
Email/Userid:




Home | About Us | Contact Us | Partner Programs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe | Whois

© 1998-2014 E-Soft Inc. All rights reserved.