Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Tue, 28 Oct 2014 21:47:32 -0400 (EDT)
From: cve-assign@...re.org
To: agc@...bsd.org
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com, security-officer@...bsd.org
Subject: Re: ftp(1) can be made execute arbitrary commands by malicious webserver

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> tnftp(1) is quite widely used

> fixes were committed to the NetBSD repo

> src/usr.bin/ftp: fetch.c

> don't pay attention to special characters if they don't come from the
> command line

> FreeBSD and Dragonfly have been informed, as has Apple, and I have
> received a boilerplate reply from Apple. The issue is present in
> 10.10 (Yosemite).

> the ftp program can be tricked into executing arbitrary commands

> The FTP client will follow HTTP redirects

> Location: http://192.168.2.19/cgi-bin/|uname%20-a

Use CVE-2014-8517.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJUUEZbAAoJEKllVAevmvmsFqkH/0l318cymZYupoZxrqFIuODh
GTbK/XCDv5ZSyUHseRVh2iGQb9dXnBO+tgS//3MnAxFSd2+GpD5Fltd8oPf1WNw2
0vcmjo8onqMtX9CU5ssh6qftOhR+VAYnf4fIybl9x1WZIV2aEJL1xnhbfeoXnbSr
VMG+6MGDKvUA+2GTnBfuW/jvsuMuX0drAzY7YExDXnxNA9Ef/ovD0mf4jJUjikL1
9fLgDgAgFXd4oQpRSuEGrsBMwLsKwwkUfWidnrI9nyEMOVI/U6ElU+Sl185uiAYl
WW/eHNkCiYhJXwbZDz9Tv4QmN2S1/w/ZZreplNzS3w+eHBh/asHx5+7MAni2Q8Q=
=Ef6C
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.