From owner-doc-jp@jp.freebsd.org  Wed Jul 12 07:51:26 2000
Received: (from daemon@localhost)
	by castle.jp.freebsd.org (8.9.3+3.2W/8.7.3) id HAA40213;
	Wed, 12 Jul 2000 07:51:26 +0900 (JST)
	(envelope-from owner-doc-jp@jp.FreeBSD.org)
Received: from smtp02.246.ne.jp (smtp02.246.ne.jp [210.253.192.36])
	by castle.jp.freebsd.org (8.9.3+3.2W/8.7.3) with SMTP id HAA40208
	for <doc-jp@jp.freebsd.org>; Wed, 12 Jul 2000 07:51:26 +0900 (JST)
	(envelope-from y-koga@jp.FreeBSD.org)
Received: (qmail 6625 invoked by alias); 12 Jul 2000 07:51:24 +0900
Message-ID: <20000711225124.6624.qmail@smtp.246.ne.jp>
Received: (qmail 6612 invoked from network); 12 Jul 2000 07:51:23 +0900
Received: from tp4hr186.246.ne.jp (HELO localhost) (210.253.193.186)
  by smtp.246.ne.jp with SMTP; 12 Jul 2000 07:51:23 +0900
To: doc-jp@jp.freebsd.org
In-Reply-To: <200007110845.e6B8jLR03063@koga.do.mms.mt.nec.co.jp>
References: <200007101254.VAA02591@sta.att.ne.jp>
	<Pine.BSF.4.21.0007110117360.91189-100000@freefall.freebsd.org>
	<200007110845.e6B8jLR03063@koga.do.mms.mt.nec.co.jp>
X-Mailer: Mew version 1.94.2 on Emacs 19.28 / Mule 2.3 (SUETSUMUHANA)
Mime-Version: 1.0
Content-Type: Text/Plain; charset=iso-2022-jp
Content-Transfer-Encoding: 7bit
Date: Wed, 12 Jul 2000 07:51:21 +0900
From: Koga Youichirou <y-koga@jp.freebsd.org>
X-Dispatcher: imput version 20000228(IM140)
Reply-To: doc-jp@jp.freebsd.org
Precedence: list
X-Distribute: distribute version 2.1 (Alpha) patchlevel 24e+000315
X-Sequence: doc-jp 7528
Subject: [doc-jp 7528] Re: ANNOUNCE: FreeBSD Ports Security Advisory:
 FreeBSD-SA-00:29.wu-ftpd
Errors-To: owner-doc-jp@jp.freebsd.org
Sender: owner-doc-jp@jp.freebsd.org
X-Originator: y-koga@jp.freebsd.org

$B$3$,(B:
> revised $B$,N.$l$k$h$&$J5$$,$9$k$N$G!"(Bannounce-jp $B$KEj$2$k$N$O>/$7BT$C$?(B
> $BJ}$,$$$$$+$b$G$9!#(B

$B=P$^$7$?$M!#;29M$^$G$K:9J,$rAw$j$^$9!#(B

--- FreeBSD-SA-00-29.BAK	Wed Jul 12 07:46:26 2000
+++ FreeBSD-SA-00-29	Wed Jul 12 07:46:02 2000
@@ -2,11 +2,12 @@
 FreeBSD-SA-00:29                                           Security Advisory
                                                                 FreeBSD, Inc.
 
-Topic:          wu-ftpd port contains remote root compromise
+Topic:          wu-ftpd port contains remote root compromise [REVISED]
 
 Category:       ports
 Module:         wu-ftpd
 Announced:      2000-07-05
+Revised:        2000-07-11
 Credits:        tf8 <tf8@ZOLO.FREELSD.NET>
 Affects:        Ports collection.
 Corrected:      2000-06-24
@@ -20,15 +21,16 @@
 II.  Problem Description
 
 The wu-ftpd port, versions 2.6.0 and below, contains a vulnerability
-which allows remote anonymous FTP users to execute arbitrary code as
-root on the local machine, by inserting string-formatting operators
-into command input, which are incorrectly parsed by the FTP server.
+which allows FTP users, both anonymous FTP users and those with a
+valid account, to execute arbitrary code as root on the local machine,
+by inserting string-formatting operators into command input, which are
+incorrectly parsed by the FTP server.
 
 The wu-ftpd port is not installed by default, nor is it "part of
 FreeBSD" as such: it is part of the FreeBSD ports collection, which
-contains over 3400 third-party applications in a ready-to-install
-format. The ports collections shipped with FreeBSD 3.5 and 4.0 contains
-this problem since it was discovered after the release.
+contains over 3500 third-party applications in a ready-to-install
+format. The ports collections shipped with FreeBSD 3.5 and 4.0
+contains this problem since it was discovered after the release.
 
 FreeBSD makes no claim about the security of these third-party
 applications, although an effort is underway to provide a security
@@ -36,11 +38,11 @@
 
 III. Impact
 
-Remote anonymous FTP users can cause arbitrary commands to be executed
-as root on the local machine.
+FTP users, including anonymous FTP users, can cause arbitrary commands
+to be executed as root on the local machine.
 
-If you have not chosen to install the wu-ftpd port/package, then
-your system is not vulnerable to this problem.
+If you have not chosen to install the wu-ftpd port/package, then your
+system is not vulnerable to this problem.
 
 IV.  Workaround
 
@@ -55,11 +57,11 @@
 2) Deinstall the old package and install a new package dated after the
 correction date, obtained from:
 
-ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/i386/packages-3-stable/ftp/wu-ftpd-2.6.0.tar.gz
-ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/i386/packages-4-stable/ftp/wu-ftpd-2.6.0.tar.gz
-ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/alpha/packages-4-stable/ftp/wu-ftpd-2.6.0.tar.gz
-ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/i386/packages-5-current/ftp/wu-ftpd-2.6.0.tar.gz
-ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/alpha/packages-5-current/ftp/wu-ftpd-2.6.0.tar.gz
+ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/i386/packages-3-stable/ftp/wu-ftpd-2.6.0.tgz
+ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/i386/packages-4-stable/ftp/wu-ftpd-2.6.0.tgz
+ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/alpha/packages-4-stable/ftp/wu-ftpd-2.6.0.tgz
+ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/i386/packages-5-current/ftp/wu-ftpd-2.6.0.tgz
+ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/alpha/packages-5-current/ftp/wu-ftpd-2.6.0.tgz
 
 NOTE: It may be several days before updated packages are available. Be
 sure to check the file creation date on the package, because the
@@ -76,3 +78,10 @@
 package can be obtained from:
 
 ftp://ftp.freebsd.org/pub/FreeBSD/ports/packages/devel/portcheckout-1.0.tgz
+
+VI.   Revision History
+
+v1.0  2000-07-05  Initial release
+v1.1  2000-07-11  Clarify that vulnerability affects all FTP users, not
+                  just anonymous FTP. Correct URL of package. Update
+                  size of ports collection.

----
$B$3$,$h$&$$$A$m$&(B
