On Mon, Dec 03, 2001 at 07:32:38AM -0600, Mary Ayala wrote: > Anyone familiar with this vulnerability? Are the patches finally > ready? Do I even need to worry? Yes, you should worry. It's a root exploit under special circumstances: 1. You compiled wu-ftpd with debugging support (for gdb) CFLAGS=-g 1.1. You are running an old version of 2.6.0 or 2.6.1 1.2. You are running Red Hat's incorrectly versioned 2.7.0 prerelease as 2.6.1-xx Note, you must have compiled it with gdb support, or loaded an rpm/package as such. Quick fix: bash# strip /usr/bin/wu-ftpd This strips the gdb symbols out of the binary. Other things to do would include disabling anonymous ftp access until you get the patch. Check the wu-ftpd site for raw patches, or consult your favorite distro for the latest packages. Note, Debian backports bugfixes and exploits to the stable branch, potato. They very rarely upgrade to a new version of the software, which will often introduce more bugs than that which is being fixed. Debian's 2.6.1 in woody is NOT vulnerable. The old 2.6.0 in potato was. Make sure you include the security updates in your sources.list. -- Chad Walstrom <chewie at wookimus.net> | a.k.a. ^chewie http://www.wookimus.net/ | s.k.a. gunnarr Get my public key, ICQ#, etc. $(mailx -s 'get info' chewie at wookimus.net) -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: 232 bytes Desc: not available Url : http://shadowknight.real-time.com/pipermail/tclug-list/attachments/20011203/f3fc1d9f/attachment.pgp