Debian: 'gftp' vulnerability
Summary
Package : gftp
Problem type : printf format attack
Debian-specific: no
The gftp package as distributed with Debian GNU/Linux 2.2 has a problem
in its logging code: it logged data received from the network but it did
not protect itself from printf format attacks. An attacker can use this
by making a FTP server return special responses that exploit this.
This has been fixed in version 2.0.6a-3.1, and we recommend that you
upgrade your gftp package.
wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
Debian GNU/Linux 2.2 alias potato
---------------------------------
Potato was released for alpha, arm, i386, m68k, powerpc and sparc.
Source archives:
MD5 checksum: 23df5107a21eaa36b3dcc50367bd3b46
MD5 checksum: b99704d17c10b1f2bbbb80d430b55d21
MD5 checksum: 8eba39ab947712b46756b4e014b72e8c
Alpha architecture:
MD5 checksum: 7df9efccb67296eb2df1e070e66add80
ARM architecture:
MD5 checksum: 2d701b8c6c4f5e05ca8664a65cf2e8d3
Intel ia32 architecture:
MD5 checksum: 71b547eec5c5e24f9dca56882b5fbf8a
Motorola 680x0 architecture:
MD5 checksum: 4f824249dd40ed70ba3f373cbad1a790
PowerPC architecture:
MD5 checksum: 12d5e7b0b433d9eeefef48c31786ee83
Sun Sparc architecture:
MD5 checksum: c0de4c7a87d2dbb153bc6a67530ac0cc
These packages will be moved into the stable distribution on its next
revision.
For not yet released architectures please refer to the appropriate
directory .
--
----------------------------------------------------------------------------
apt-get: deb Debian -- Security Information stable/updates main
dpkg-ftp: dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org