Updated ProFTPD packages fix vulnerability
A portability workaround that was applied in version 1.2.9 of the ProFTPD FTP server caused CIDR based ACL entries in "Allow" and "Deny" directives to act like an "AllowAll" directive. This granted FTP clients access to files and directories that the server configuration may have been explicitly denying.
-----BEGIN PGP SIGNED MESSAGE-----
Mandrakelinux Security Update Advisory
Package name: proftpd
Advisory ID: MDKSA-2004:041
Date: April 30th, 2004
Affected versions: 10.0
A portability workaround that was applied in version 1.2.9 of the
ProFTPD FTP server caused CIDR based ACL entries in "Allow" and "Deny"
directives to act like an "AllowAll" directive. This granted FTP
clients access to files and directories that the server configuration
may have been explicitly denying.
This problem only exists in version 1.2.9 and has been fixed upstream.
A patch has been applied to correct the problem.
To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
A list of FTP mirrors can be obtained from:
All packages are signed by Mandrakesoft for security. You can obtain
the GPG public key of the Mandrakelinux Security Team by executing:
gpg --recv-keys --keyserver www.mandrakesecure.net 0x22458A98
Please be aware that sometimes it takes the mirrors a few hours to
You can view other update advisories for Mandrakelinux at:
Mandrakesoft has several security-related mailing list services that
anyone can subscribe to. Information on these lists can be obtained by
If you want to report vulnerabilities, please contact
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Linux Mandrake Security Team
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (GNU/Linux)
-----END PGP SIGNATURE-----