Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [day] [month] [year] [list]
Date: Thu, 12 Mar 2015 17:44:54 +0100
From: Vasyl Kaigorodov <vkaigoro@...hat.com>
To: oss-security@...ts.openwall.com
Cc: 774769@...s.debian.org
Subject: CVE request: lftp saves unknown host's fingerprint in known_hosts
 without any prompt

Hello,

I did not see a CVE request for this yet - so here we go:

While connecting to an unknown host, lftp silently accepts it's
fingerprint and adds it to the known_hosts file.
This makes MitM attack possible.

Upstream report...
https://github.com/lavv17/lftp/issues/116
...and the fix:
https://github.com/lavv17/lftp/commit/bc7b476e782d77839765f56bbdb4cee9f36b54ec

References:
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=774769
https://bugzilla.redhat.com/show_bug.cgi?id=1180209

Can a CVE be assigned to this please?

Thanks.
-- 
Vasyl Kaigorodov | Red Hat Product Security
PGP:  0xABB6E828 A7E0 87FF 5AB5 48EB 47D0 2868 217B F9FC ABB6 E828

Content of type "application/pgp-signature" skipped

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ