=====================================================================
                                  CERT-Renater

                       Note d'Information No. 2005/VULN105
_____________________________________________________________________

DATE                      : 22/02/2005

HARDWARE PLATFORM(S)      : /

OPERATING SYSTEM(S)       : Systems running GProFTPD versions prior to 8.1.9.

======================================================================

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory                           GLSA 200502-26
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                                             http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

   Severity: Normal
      Title: GProFTPD: gprostats format string vulnerability
       Date: February 18, 2005
       Bugs: #81894
         ID: 200502-26

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis
========

gprostats, distributed with GProFTPD, is vulnerable to a format string
vulnerability, potentially leading to the execution of arbitrary code.

Background
==========

GProFTPD is a GTK+ administration tool for the ProFTPD server. GProFTPD
is distributed with gprostats, a utility to parse ProFTPD transfer
logs.

Affected packages
=================

     -------------------------------------------------------------------
      Package           /  Vulnerable  /                     Unaffected
     -------------------------------------------------------------------
   1  net-ftp/gproftpd       < 8.1.9                           >= 8.1.9

Description
===========

Tavis Ormandy of the Gentoo Linux Security Audit Team has identified a
format string vulnerability in the gprostats utility.

Impact
======

An attacker could exploit the vulnerability by performing a specially
crafted FTP transfer, the resulting ProFTPD transfer log could
potentially trigger the execution of arbitrary code when parsed by
GProFTPD.

Workaround
==========

There is no known workaround at this time.

Resolution
==========

All GProFTPD users should upgrade to the latest version:

     # emerge --sync
     # emerge --ask --oneshot --verbose ">=net-ftp/gproftpd-8.1.9"

Availability
============

This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

   http://security.gentoo.org/glsa/glsa-200502-26.xml

Concerns?
=========

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users machines is of utmost
importance to us. Any security concerns should be addressed to
security at gentoo.org or alternatively, you may file a bug at
http://bugs.gentoo.org.

License
=======

Copyright 2005 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.0
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: not available
Url : http://lists.netsys.com/pipermail/full-disclosure/attachments/20050218/4d2ced7b/attachment.bin


======================================================================

         =========================================================
         Les serveurs de référence du CERT-Renater
         http://www.urec.fr/securite
         http://www.cru.fr/securite
         http://www.renater.fr
         =========================================================
         + CERT-RENATER          | tel : 01-53-94-20-44          +
         + 151 bd de l'Hopital   | fax : 01-53-94-20-41          +
         + 75013 Paris           | email: certsvp@renater.fr     +
         =========================================================

