Bugtraq mailing list archives

[ GLSA 200502-26 ] GProFTPD: gprostats format string vulnerability


From: Sune Kloppenborg Jeppesen <jaervosz () gentoo org>
Date: Fri, 18 Feb 2005 17:01:43 +0100

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory                           GLSA 200502-26
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                                            http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

  Severity: Normal
     Title: GProFTPD: gprostats format string vulnerability
      Date: February 18, 2005
      Bugs: #81894
        ID: 200502-26

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis
========

gprostats, distributed with GProFTPD, is vulnerable to a format string
vulnerability, potentially leading to the execution of arbitrary code.

Background
==========

GProFTPD is a GTK+ administration tool for the ProFTPD server. GProFTPD
is distributed with gprostats, a utility to parse ProFTPD transfer
logs.

Affected packages
=================

    -------------------------------------------------------------------
     Package           /  Vulnerable  /                     Unaffected
    -------------------------------------------------------------------
  1  net-ftp/gproftpd       < 8.1.9                           >= 8.1.9

Description
===========

Tavis Ormandy of the Gentoo Linux Security Audit Team has identified a
format string vulnerability in the gprostats utility.

Impact
======

An attacker could exploit the vulnerability by performing a specially
crafted FTP transfer, the resulting ProFTPD transfer log could
potentially trigger the execution of arbitrary code when parsed by
GProFTPD.

Workaround
==========

There is no known workaround at this time.

Resolution
==========

All GProFTPD users should upgrade to the latest version:

    # emerge --sync
    # emerge --ask --oneshot --verbose ">=net-ftp/gproftpd-8.1.9"

Availability
============

This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

  http://security.gentoo.org/glsa/glsa-200502-26.xml

Concerns?
=========

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users machines is of utmost
importance to us. Any security concerns should be addressed to
security () gentoo org or alternatively, you may file a bug at
http://bugs.gentoo.org.

License
=======

Copyright 2005 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.0

Attachment: _bin
Description:


Current thread: