stable

proftpd-1.3.3g-2.el6

FEDORA-EPEL-2013-0157 created by pghmcfc 12 years ago for Fedora EPEL 6

Jann Horn reported that there is a possible race condition in the handling of the MKD/XMKD FTP commands, when the UserOwner directive is involved, and the attacker is on the same physical machine as a running proftpd. This race applies to mod_sftp and the handling of the MKDIR SFTP request as well.

Note that using the DefaultRoot directive to restrict sessions mitigates this attack, since the symlinks created by the local attacker will point outside of the chroot(2) area within the FTP session, and thus the ownership change will fail. The default configuration in EPEL applies the DefaultRoot directive to all users except "adm".

The upstream reference for this issue is: http://bugs.proftpd.org/show_bug.cgi?id=3841

This update includes a backport to 1.3.3g of upstream's backport to proftpd 1.3.4 of the fix for this issue.

This update has been submitted for testing by pghmcfc.

12 years ago

This update is currently being pushed to the Fedora EPEL 6 testing updates repository.

12 years ago

This update has been pushed to testing

12 years ago

This update has reached 14 days in testing and can be pushed to stable now if the maintainer wishes

12 years ago

This update has been submitted for stable by pghmcfc.

12 years ago

This update is currently being pushed to the Fedora EPEL 6 stable updates repository.

12 years ago

This update has been pushed to stable

12 years ago

Please login to add feedback.

Metadata
Type
security
Karma
0
Signed
Content Type
RPM
Test Gating
Autopush Settings
Unstable by Karma
-3
Stable by Karma
disabled
Stable by Time
disabled
Dates
submitted
12 years ago
in testing
12 years ago
in stable
12 years ago
BZ#892715 CVE-2012-6095 proftpd: Symlink race condition when applying UserOwner to a newly (ProFTPD) created directory
0
0
BZ#892719 CVE-2012-6095 proftpd: Symlink race condition when applying UserOwner to a newly (ProFTPD) created directory [epel-all]
0
0

Automated Test Results