Debian Security Advisory

ftpd -- buffer overflow in ftpd

Date Reported:
11 Jul 2000
Affected Packages:
netstd (ftpd)
Vulnerable:
Yes
Security database references:
No other external database security references currently available.
More information:
The ftpd shipped in the netstd package in Debian GNU/Linux 2.1 (slink) is vulnerable to the widely discussed "setproctitle bug." The ftpd in the not-yet-released Debian GNU/Linux 2.2 (potato) is also vulnerable.

This problem has been corrected in netstd 3.07-7slink.4 for Debian GNU/Linux 2.1 (slink) and in ftpd 0.11-8potato.1 for Debian GNU/Linux 2.2 (potato). We recommend upgrading your ftpd immediately.

Fixed in:

Debian GNU/Linux 2.1 (slink):

Source:
http://security.debian.org/dists/slink/updates/source/netstd_3.07-7slink.4.diff.gz
http://security.debian.org/dists/slink/updates/source/netstd_3.07-7slink.4.dsc
http://security.debian.org/dists/slink/updates/source/netstd_3.07.orig.tar.gz
alpha:
http://security.debian.org/dists/slink/updates/binary-alpha/netstd_3.07-7slink.4_alpha.deb
i386:
http://security.debian.org/dists/slink/updates/binary-i386/netstd_3.07-7slink.4_i386.deb
m68k:
http://security.debian.org/dists/slink/updates/binary-m68k/netstd_3.07-7slink.4_m68k.deb
sparc:
http://security.debian.org/dists/slink/updates/binary-sparc/netstd_3.07-7slink.4_sparc.deb

Debian GNU/Linux 2.2 (potato):

Source:
http://security.debian.org/dists/potato/updates/main/source/linux-ftpd_0.11-8potato.1.diff.gz
http://security.debian.org/dists/potato/updates/main/source/linux-ftpd_0.11-8potato.1.dsc
http://security.debian.org/dists/potato/updates/main/source/linux-ftpd_0.11.orig.tar.gz
arm:
http://security.debian.org/dists/potato/updates/main/binary-arm/ftpd_0.11-8potato.1_arm.deb
i386:
http://security.debian.org/dists/potato/updates/main/binary-i386/ftpd_0.11-8potato.1_i386.deb
sparc:
http://security.debian.org/dists/potato/updates/main/binary-sparc/ftpd_0.11-8potato.1_sparc.deb