You can subscribe to this list here.
| 2003 |
Jan
|
Feb
|
Mar
|
Apr
|
May
|
Jun
|
Jul
|
Aug
|
Sep
(2) |
Oct
|
Nov
|
Dec
|
|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 2004 |
Jan
|
Feb
(2) |
Mar
|
Apr
|
May
|
Jun
|
Jul
|
Aug
|
Sep
|
Oct
(1) |
Nov
|
Dec
|
| 2005 |
Jan
|
Feb
|
Mar
|
Apr
|
May
|
Jun
|
Jul
|
Aug
|
Sep
(1) |
Oct
|
Nov
|
Dec
|
| 2007 |
Jan
(1) |
Feb
|
Mar
|
Apr
|
May
|
Jun
|
Jul
|
Aug
|
Sep
|
Oct
(1) |
Nov
|
Dec
|
|
From: pollux <po...@wz...> - 2007-10-28 13:28:16
|
wzdftpd 0.8.3 has been released. This release fixes a security problem (CVE-2007-5300): k1tk4t has discovered a vulnerability in wzdftpd, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially to compromise a vulnerable system. The vulnerability is caused due to an off-by-one error within the "do_login_loop()" function in libwzd-core/wzd_login.c. This can be exploited to cause a stack-based buffer overflow with a zero byte by sending an overly long string to the affected server (over 4095 bytes). The vulnerability is confirmed in version 0.8.2. Other versions may also be affected. Solution: Upgrade to 0.8.3 Other fixes in the release: * Misc problems with TLS (GnuTLS/OpenSSL compatibility) * Some memory leaks with OpenSSL * Better use of PASV range=20 You can download the source code from SourceForge as follows: URL: http://downloads.sourceforge.net/wzdftpd/wzdftpd-0.8.3.tar.gz MD5: 6114c32fc91786d9485fbc10c6306082 SHA1: f47e19b5d9df2b15d27aa73e663bc4da0b9d4a1f |
|
From: Pierre C. <chi...@cp...> - 2007-01-31 09:55:08
|
Date: Jan 19 2007 Topic: Unspecified Bug Lets Remote Users Cause Denial of Service Conditions Systems affected: wzdftpd 0.8.0 Platforms: all Severity: medium to high Fixed: wzdftpd 0.8.1 Description: A bug was found in the command parser, resulting in a server crash if the user sends a specially crafted FTP command. This requires an authenticated user. Jose Miguel Esparza of S21Sec discovered this vulnerability. The original advisory is available at: http://www.s21sec.com/avisos/s21sec-033-en.txt Impact: A remote attacker can cause the server to crash, or a denial-of-service situation. We believe that the vulnerability can not be exploited. Solution: Upgrade to version 0.8.1 As a workaround, you can add a "key != NULL" condition in the chtbl_lookup function of the 'libwzd-base/hash.c' file The wzdftpd team. |
|
From: pollux <po...@wz...> - 2005-09-26 09:44:10
|
Date: 26/09/2005 Topic: unsecure use of popen() in wzdftpd <= 0.5.4 Systems affected: wzdftpd 0.5.4 and prior wzdftpd-cvs: source prior to September 26, 2005 Platforms: all Severity: high to critical (remote exploitation possible) Description: wzdftpd offers the possibility to extend site commands by adding custom site commands in configuration file. Some of these commands may be executed using the popen() function, without the necessary checks. This can be exploited by a remote attacker to execute commands as the user running wzdftpd on the server, usually user 'ftp' but it can be root on some systems. The severity is not set to critical since this does not affect the default configuration, as no custom site command is provided. Solution: Temporarily disable any custom site command in the configuration file (directives: cscript and site_cmd) and patch the server with the attached patch (or upgrade to the shortcoming 0.5.5 version). The wzdftpd team. |
|
From: pollux <po...@wz...> - 2004-10-28 12:52:49
|
DATE: 28/10/2004
Topic: multiple vulnerabilities in wzdftpd 0.4.2
Systems affected: wzdftpd 0.4.0, 0.4.1 and 0.4.2
wzdftpd-cvs: source prior October, 20, 2004
Platforms: all
Severity: medium to high
Fixed: wzdftpd 0.4.3
wzdftpd-cvs: October, 20, 2004
Description:
Several different vulnerabilities have been identified in wzdftpd
0.4.2, many of them can lead to a crash or a DoS.
* maximum number of users is not checked correctly when adding users,
causing the server to corrupt groups definitions.
* ident connections were not closed in all cases when many connections
happened in a very short amount of time, causing a file descriptors
leak, and leading to a remote DoS in some cases.
* files with spaces were not handled correctly if using acls but no
generic mode (chmod), causing corruption of .dirinfo
Impact:
A remote attacker can cause the server to crash or a
denial-of-service situation.
Other problems can lead to file corruptions.
Solution:
Upgrade to the 0.4.3 version, available here:
https://sourceforge.net/project/showfiles.php?group_id=78247&package_id=79308&release_id=263573
The wzdftpd team.
|
|
From: pollux <po...@wz...> - 2004-02-15 19:57:08
|
WZDFTPD Security Advisory 2004-02
Topic: possible buffer overflow in LIST command
Version: wzdftpd-cvs: prior Feb, 15 2004
wzdftpd 0.2.1
wzdftpd 0.2
wzdftpd < 0.2
Platform: all platforms
Severity: high
Fixed: wzdftpd-cvs: Feb, 15 2004
wzdftpd 0.2.2
Details:
wzdftpd accepts arguments for the LIST command.
However, length was not correctly tested and can lead to a buffer overflow by
sending a huge buffer.
Successful exploitation may allow execution of arbitrary code on an
affected system, with server privileges.
Fix:
update to lastest CVS version, or 0.2.2
Patch is attached.
Acknowledgements:
Thanks to the ecl-il team for reporting us the problem, and
providing many usefull informations.
|
|
From: pollux <po...@wz...> - 2004-02-13 14:01:25
|
WZDFTPD Security Advisory 2004-01
Topic: crash when using server in PORT mode
Version: wzdftpd-cvs: prior Feb, 13 2004
wzdftpd 0.2
wzdftpd < 0.2
Platform: FreeBSD (all versions)
Severity: medium (remote crash)
Fixed: wzdftpd-cvs: Feb, 13 2004
wzdftpd 0.2.1
Details:
wzdftpd tries to check if network connection is writable before
connecting to a remote host, this mechanism is not supported by FreeBSD
and leads to a crash.
We do not believe this crash to be exploitable.
Fix:
update to lastest CVS version, or 0.2.1.
Patch is attached.
|
|
From: Roman B. <bog...@in...> - 2003-09-26 12:31:41
|
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
WZDFTPD Security Advisory 2003-.02
Topic: DoS via sending a single CRLF sequence at login
Version: wzdftpd-cvs: source prior September, 25 2003
wzdftpd 0.1RC5
wzdtpd <0.1RC4
Severity: remote denail of service
Fixed: wzdftpd-cvs: September, 25 2003
wzdftpd 0.1RC5: September, 25 2003
other versions are not supported
Details:
wzdftpd has an internal check during the login process to verify the input.
however, sending a single CRLF sequence at login will cause an Unhandled
exception at the server.
Fix:
For cvs version users: not vulnerable since Sep, 25 2003
For wzdftpd 0.1rc5: patch is attached
For wzdftpd <0.1rc5: You need to upgrade, those versions are no longer supported.
Acknowledgements:
Thanks to Moran Zavdi from Moozatech IT Systems Ltd[1]
References:
Moozatech Advisory [2]
Original bu...@se... message [3]
[1] http://www.moozatech.com
[2] http://www.moozatech.com/mt-23-09-2003.txt
[3] http://securityfocus.com/archive/1/338631/2003-09-23/2003-09-29/0
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.2 (FreeBSD)
iQEVAwUBP3QxdCpMDQ8aPhy0AQJTMQf8Cr9yzOUC24ooMoM3Jff1eDNtBhB6MTGz
bGw+WJFffvq40RKEE6q1tTaNttmRzycZa+uIE0InURpnic3oCm6o1xB20SoHEDQC
eE7or0fRoBabCkwtw91yBBhf91NZG4nyepvGsuOZ/eCNm+szWoDLX6c4dArC9e37
pgA2ehRXbY9Lwx/di8lYLzQNH7al3d+5D8hFNfYoWcd1CljQb+x6gCqj/9rldEaU
1d+T82FgaIqAe+gU/sPZBnVOZ8X+PXFqo2Z+38GrMbi+eFCgxRnT3tZv7b5Hbpkj
qFykFO3Q1iPrwdVilGSb9tdfOv404oHYn55TSUpGMOVut1SmgfyFlg==
=cOe1
-----END PGP SIGNATURE-----
|
|
From: pollux <po...@wz...> - 2003-09-26 09:38:15
|
Application: wzdftpd FTP Server Web Site: http://www.wzdftpd.net Versions: 0.1rc5 Platform: Windows 2000,WindowsXP,UNIX systems might also be affected. Risk: Remote DOS. Severity: Medium Fix Available: Yes 1) Bug wzdftpd has an internal check during the login process to verify the input. however, sending a single CRLF sequence at login will cause an Unhandled exception at the server. 2) Fix Upgrade to daily version 20030923 or use CVS code 3) Acknowledgements Thanks to Moozatech Advisory for reporting the problem see http://www.moozatech.com/mt-23-09-2003.txt /P -- In /dev/null no one can here you scream ! // Pollux <po...@wz...> \\ // \\ \\ Creator of wzdftpd -- http://www.wzdftpd.net // \\ // |