Home > Security > Advisories

Advisories

Mandriva Advisories

Package name proftpd
Date January 23rd, 2007
Advisory ID MDKSA-2006:217-2
Affected versions CS3.0
Synopsis Updated proftpd packages fix vulnerabilities

Problem Description

A stack-based buffer overflow in the sreplace function in ProFTPD 1.3.0
and earlier, allows remote attackers to cause a denial of service, as
demonstrated by vd_proftpd.pm, a "ProFTPD remote exploit."
(CVE-2006-5815)

Buffer overflow in the tls_x509_name_oneline function in the mod_tls
module, as used in ProFTPD 1.3.0a and earlier, and possibly other
products, allows remote attackers to execute arbitrary code via a large
data length argument, a different vulnerability than CVE-2006-5815.
(CVE-2006-6170)

ProFTPD 1.3.0a and earlier does not properly set the buffer size limit
when CommandBufferSize is specified in the configuration file, which
leads to an off-by-two buffer underflow. NOTE: in November 2006, the
role of CommandBufferSize was originally associated with CVE-2006-5815,
but this was an error stemming from an initial vague disclosure. NOTE:
ProFTPD developers dispute this issue, saying that the relevant memory
location is overwritten by assignment before further use within the
affected function, so this is not a vulnerability. (CVE-2006-6171)

Packages have been patched to correct these issues.

Update:

The update for the Corporate 3.0 platforms had a bad patch for
CVE-2006-5815, which prevented some clients from being able to use the
server. This update corrects this issue.

Updated Packages

Corporate Server 3.0

 98a60448e690842a0afe6cb50925ceeb  corporate/3.0/i586/proftpd-1.2.9-3.7.C30mdk.i586.rpm
 9aee57777e7d355fa8b730a79f4a58df  corporate/3.0/i586/proftpd-anonymous-1.2.9-3.7.C30mdk.i586.rpm 
 1cf5d2e63700ee924b0346bdd72505d9  corporate/3.0/SRPMS/proftpd-1.2.9-3.7.C30mdk.src.rpm

Corporate Server 3.0/X86_64

 a3baa6cdea37f84a99c24b4c3c681ca6  corporate/3.0/x86_64/proftpd-1.2.9-3.7.C30mdk.x86_64.rpm
 de981e7a4a3eec5371a31079c50d5c17  corporate/3.0/x86_64/proftpd-anonymous-1.2.9-3.7.C30mdk.x86_64.rpm 
 1cf5d2e63700ee924b0346bdd72505d9  corporate/3.0/SRPMS/proftpd-1.2.9-3.7.C30mdk.src.rpm

References

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5815
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6170
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6171

Upgrade

To upgrade automatically, use MandrivaUpdate.


Verification

Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command :

                rpm --checksig package.rpm
                

You can get the GPG public key of the Mandriva Security Team to verify the GPG signature of each RPM.

If you use MandrivaUpdate, the verification of md5 checksum and GPG signature is performed automatically for you.