[<prev] [next>] [day] [month] [year] [list]
Message-Id: <E1QN6qK-0003iZ-Qt@titan.mandriva.com>
Date: Thu, 19 May 2011 19:17:00 +0200
From: security@...driva.com
To: bugtraq@...urityfocus.com
Subject: [ MDVSA-2011:094 ] pure-ftpd
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
_______________________________________________________________________
Mandriva Linux Security Advisory MDVSA-2011:094
http://www.mandriva.com/security/
_______________________________________________________________________
Package : pure-ftpd
Date : May 19, 2011
Affected: 2009.0, 2010.1, Corporate 4.0, Enterprise Server 5.0
_______________________________________________________________________
Problem Description:
A denial-of-service (DoS) attack related to glob brace expansion was
discovered and fixed in pure-ftpd (CVE-2011-0418).
Packages for 2009.0 are provided as of the Extended Maintenance
Program. Please visit this link to learn more:
http://store.mandriva.com/product_info.php?cPath=149&products_id=490
The updated packages have been upgraded to the latest 1.0.32 version
which is not vulnerable to this issue.
_______________________________________________________________________
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0418
http://www.pureftpd.org/project/pure-ftpd/news
_______________________________________________________________________
Updated Packages:
Mandriva Linux 2009.0:
2acd88195b55f8a53e0f22ccd5260c24 2009.0/i586/pure-ftpd-1.0.32-0.1mdv2009.0.i586.rpm
bfac76c40846a52ddf9b8a1abc5edf3c 2009.0/i586/pure-ftpd-anon-upload-1.0.32-0.1mdv2009.0.i586.rpm
b1e3fcd7ffa2259f02e186d4c5dc50a3 2009.0/i586/pure-ftpd-anonymous-1.0.32-0.1mdv2009.0.i586.rpm
f58daf4b54a354e82a794d100d4781a6 2009.0/SRPMS/pure-ftpd-1.0.32-0.1mdv2009.0.src.rpm
Mandriva Linux 2009.0/X86_64:
1ef86906a451c694bdba178f9371ff9d 2009.0/x86_64/pure-ftpd-1.0.32-0.1mdv2009.0.x86_64.rpm
4f68287740f187b37b3e7d5cf081e197 2009.0/x86_64/pure-ftpd-anon-upload-1.0.32-0.1mdv2009.0.x86_64.rpm
4b257580afe20999e43f34fa921d70d6 2009.0/x86_64/pure-ftpd-anonymous-1.0.32-0.1mdv2009.0.x86_64.rpm
f58daf4b54a354e82a794d100d4781a6 2009.0/SRPMS/pure-ftpd-1.0.32-0.1mdv2009.0.src.rpm
Mandriva Linux 2010.1:
ccc0647d427a31a103ca739d0ba20bfc 2010.1/i586/pure-ftpd-1.0.32-0.1mdv2010.2.i586.rpm
72642833bdcc96ce5facd5952b06066a 2010.1/i586/pure-ftpd-anon-upload-1.0.32-0.1mdv2010.2.i586.rpm
6e4956263a8655cc5403a8f5958019b1 2010.1/i586/pure-ftpd-anonymous-1.0.32-0.1mdv2010.2.i586.rpm
ca752489c3af7bd14ab5b7d1c232e72f 2010.1/SRPMS/pure-ftpd-1.0.32-0.1mdv2010.2.src.rpm
Mandriva Linux 2010.1/X86_64:
c3361b5b91ee6429933b70785eba5a80 2010.1/x86_64/pure-ftpd-1.0.32-0.1mdv2010.2.x86_64.rpm
1a11cce6839229c1f312f56c322ca615 2010.1/x86_64/pure-ftpd-anon-upload-1.0.32-0.1mdv2010.2.x86_64.rpm
ccdf372f525a69dca66ed58d1241dfa2 2010.1/x86_64/pure-ftpd-anonymous-1.0.32-0.1mdv2010.2.x86_64.rpm
ca752489c3af7bd14ab5b7d1c232e72f 2010.1/SRPMS/pure-ftpd-1.0.32-0.1mdv2010.2.src.rpm
Corporate 4.0:
0441583b4381e946911a13795b6edccf corporate/4.0/i586/pure-ftpd-1.0.32-0.1.20060mlcs4.i586.rpm
375127a30296a60eac2152905412b798 corporate/4.0/i586/pure-ftpd-anon-upload-1.0.32-0.1.20060mlcs4.i586.rpm
38b01d4b3584d3995ca7790b25ccaae6 corporate/4.0/i586/pure-ftpd-anonymous-1.0.32-0.1.20060mlcs4.i586.rpm
dc7cec35f7bbb78c15ef04dc617a9c8a corporate/4.0/SRPMS/pure-ftpd-1.0.32-0.1.20060mlcs4.src.rpm
Corporate 4.0/X86_64:
58de36c82139959d006fe0892f66d696 corporate/4.0/x86_64/pure-ftpd-1.0.32-0.1.20060mlcs4.x86_64.rpm
42f29b1fd2b858908e10ffd5bcd07247 corporate/4.0/x86_64/pure-ftpd-anon-upload-1.0.32-0.1.20060mlcs4.x86_64.rpm
6bad2661dd405402bd966222fdaec9e0 corporate/4.0/x86_64/pure-ftpd-anonymous-1.0.32-0.1.20060mlcs4.x86_64.rpm
dc7cec35f7bbb78c15ef04dc617a9c8a corporate/4.0/SRPMS/pure-ftpd-1.0.32-0.1.20060mlcs4.src.rpm
Mandriva Enterprise Server 5:
ead5a422b7e60c1af65a81c53b618260 mes5/i586/pure-ftpd-1.0.32-0.1mdvmes5.2.i586.rpm
ccc02756eb2130f16967487916cef75f mes5/i586/pure-ftpd-anon-upload-1.0.32-0.1mdvmes5.2.i586.rpm
aca8ae84abda72076ee40a99e1d145ad mes5/i586/pure-ftpd-anonymous-1.0.32-0.1mdvmes5.2.i586.rpm
f9015d52a7cb03280973a24874bf6267 mes5/SRPMS/pure-ftpd-1.0.32-0.1mdvmes5.2.src.rpm
Mandriva Enterprise Server 5/X86_64:
641b2ef9d80017720523e3102ca2b78c mes5/x86_64/pure-ftpd-1.0.32-0.1mdvmes5.2.x86_64.rpm
5109cfc4c1747e0834fa47bb37269bf3 mes5/x86_64/pure-ftpd-anon-upload-1.0.32-0.1mdvmes5.2.x86_64.rpm
8baf20ef3e7b2b730e76d9310d8b8c09 mes5/x86_64/pure-ftpd-anonymous-1.0.32-0.1mdvmes5.2.x86_64.rpm
f9015d52a7cb03280973a24874bf6267 mes5/SRPMS/pure-ftpd-1.0.32-0.1mdvmes5.2.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
_______________________________________________________________________
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
iD8DBQFN1SCXmqjQ0CJFipgRAt1pAKClEOFhAM+KNvN0SF0sP88LdiSQSACgscCW
InlPA3J98nnGsu3MmJkc3iA=
=S/mD
-----END PGP SIGNATURE-----
Powered by blists - more mailing lists