WU-FTPD 2.6.2 has been released. 

The following security patches are available and should be applied.

* connect-dos.patch

    Fixes a possible denial of service attack on systems that allow only one
    non-connected socket bound to the same local address.

* realpath.patch

    Fixes an off-by-one error in the fb_realpath() function, as derived 
    from the realpath function in BSD, may allow attackers to execute 
    arbitrary code, as demonstrated in wu-ftpd 2.5.0 through 2.6.2 via 
    commands that cause pathnames of length MAXPATHLEN+1 to trigger a 
    buffer overflow, including (1) STOR, (2) RETR, (3) APPE, (4) DELE, 
    (5) MKD, (6) RMD, (7) STOU, or (8) RNTO.  SEE CVE CAN-2003-0466 

* skeychallenge.patch

    Fixes a potential stack overflow in the handling of S/Key challenge
    logins.

