Debian Security Advisory DSA 473-1                     security@debian.org 
Debian -- Security Information                              Matt Zimmerman
April 3rd, 2004                          Debian -- Debian security FAQ 
- --------------------------------------------------------------------------

Package        : oftpd
Problem-Type   : denial of service
Debian-specific: no
CVE Ids        : CAN-2004-0376
Debian bug     : 216871

A vulnerability was discovered in oftpd, an anonymous FTP server,
whereby a remote attacker could cause the oftpd process to crash by
specifying a large value in a PORT command.

For the stable distribution (woody) this problem has been fixed in
version 0.3.6-6.

For the unstable distribution (sid) these problems have been fixed in
version 20040304-1.

We recommend that you update your oftpd package.

Upgrade Instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 3.0 alias woody
- --------------------------------

  Source archives:

      
      Size/MD5 checksum:      582 ec0796ba52c95ba4ee83414917b656c4
      
      Size/MD5 checksum:    49463 329930f2d835f6c754b6c79a496f038a
      
      Size/MD5 checksum:    77201 78b4139bb0108297b9814564db986852

  Alpha architecture:

      
      Size/MD5 checksum:    46166 cea2315f6960525ac9c113510f20dfbc

  ARM architecture:

      
      Size/MD5 checksum:    40084 28fb6ba5082855444980ca611e8429c0

  Intel IA-32 architecture:

      
      Size/MD5 checksum:    38442 32cacf8eb9d37a8406302811ac3d62ac

  Intel IA-64 architecture:

      
      Size/MD5 checksum:    53688 3142a68ecc08c448e082d339812796c8

  HP Precision architecture:

      
      Size/MD5 checksum:    42828 eef0881c474cce76cdf012ac797b8203

  Big endian MIPS architecture:

      
      Size/MD5 checksum:    39898 316629cf18ed8906ea09b84140ecf64c

  Little endian MIPS architecture:

      
      Size/MD5 checksum:    39976 1e6fc0b5f9c402d15541f8d5bd6a36a9

  PowerPC architecture:

      
      Size/MD5 checksum:    39434 a712ef00a8bc169f4bfd319583367f59

  IBM S/390 architecture:

      
      Size/MD5 checksum:    38824 eb1405f335b5344b43b7617ee9b1ecfd

  Sun Sparc architecture:

      
      Size/MD5 checksum:    42250 15668b00038e349cbf6b0331d791532d

  These files will probably be moved into the stable distribution on
  its next revision.

- ---------------------------------------------------------------------------------
For apt-get: deb  Debian -- Security Information  stable/updates main
For dpkg-ftp:    dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show ' and  http://packages.debian.org/

Debian: oftpd Denial of service vulnerability

April 5, 2004
A remote attacker could cause the oftpd process to crash by specifying a large value in a PORT command.

Summary

A vulnerability was discovered in oftpd, an anonymous FTP server,
whereby a remote attacker could cause the oftpd process to crash by
specifying a large value in a PORT command.

For the stable distribution (woody) this problem has been fixed in
version 0.3.6-6.

For the unstable distribution (sid) these problems have been fixed in
version 20040304-1.

We recommend that you update your oftpd package.

Upgrade Instructions
- --------------------

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 3.0 alias woody

Source archives:


Size/MD5 checksum: 582 ec0796ba52c95ba4ee83414917b656c4

Size/MD5 checksum: 49463 329930f2d835f6c754b6c79a496f038a

Size/MD5 checksum: 77201 78b4139bb0108297b9814564db986852

Alpha architecture:


Size/MD5 checksum: 46166 cea2315f6960525ac9c113510f20dfbc

ARM architecture:


Size/MD5 checksum: 40084 28fb6ba5082855444980ca611e8429c0

Intel IA-32 architecture:


Size/MD5 checksum: 38442 32cacf8eb9d37a8406302811ac3d62ac

Intel IA-64 architecture:


Size/MD5 checksum: 53688 3142a68ecc08c448e082d339812796c8

HP Precision architecture:


Size/MD5 checksum: 42828 eef0881c474cce76cdf012ac797b8203

Big endian MIPS architecture:


Size/MD5 checksum: 39898 316629cf18ed8906ea09b84140ecf64c

Little endian MIPS architecture:


Size/MD5 checksum: 39976 1e6fc0b5f9c402d15541f8d5bd6a36a9

PowerPC architecture:


Size/MD5 checksum: 39434 a712ef00a8bc169f4bfd319583367f59

IBM S/390 architecture:


Size/MD5 checksum: 38824 eb1405f335b5344b43b7617ee9b1ecfd

Sun Sparc architecture:


Size/MD5 checksum: 42250 15668b00038e349cbf6b0331d791532d

These files will probably be moved into the stable distribution on
its next revision.

For apt-get: deb Debian -- Security Information stable/updates main
For dpkg-ftp: dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show ' and http://packages.debian.org/



Severity
Package : oftpd
Problem-Type : denial of service
Debian-specific: no
CVE Ids : CAN-2004-0376
Debian bug : 216871

Related News