Bug 13475

Summary: Security hole in wu-ftpd 2.5.0
Product: Ports & Packages Reporter: jack <jack>
Component: Individual Port(s)Assignee: freebsd-ports (Nobody) <ports>
Status: Closed FIXED    
Severity: Affects Only Me    
Priority: Normal    
Version: Latest   
Hardware: Any   
OS: Any   
Attachments:
Description Flags
file.diff none

Description jack 1999-08-30 20:00:01 UTC
Quoted from wu-ftpd group's accouncement:

    Due to insufficient bounds checking on directory name lengths which can
	be supplied by users, it is possible to overwrite the static memory
	space of the wu-ftpd daemon while it is executing under certain
	configurations.  By having the ability to create directories and
	supplying carefully designed directory names to the wu-ftpd, users may
	gain privileged access.

Fix: apply their patch
Comment 1 cpiazza freebsd_committer freebsd_triage 1999-08-30 20:14:10 UTC
State Changed
From-To: open->closed

Committed, thanks!!