Gentoo Logo

gFTP: Multiple vulnerabilities


1.  Gentoo Linux Security Advisory

Version Information

Advisory Reference GLSA 200711-01 / gftp
Release Date November 01, 2007
Latest Revision November 01, 2007: 01
Impact normal
Exploitable remote
Package Vulnerable versions Unaffected versions Architecture(s)
net-ftp/gftp < 2.0.18-r6 >= 2.0.18-r6 All supported architectures

Related bugreports: #188252


Two buffer overflow vulnerabilities have been discovered in fsplib code used in gFTP.

2.  Impact Information


gFTP is an FTP client for the GNOME desktop environment.


Kalle Olavi Niemitalo discovered two boundary errors in fsplib code included in gFTP when processing overly long directory or file names.


A remote attacker could trigger these vulnerabilities by enticing a user to download a file with a specially crafted directory or file name, possibly resulting in the execution of arbitrary code (CVE-2007-3962) or a Denial of Service (CVE-2007-3961).

3.  Resolution Information


There is no known workaround at this time.


All gFTP users should upgrade to the latest version:

Code Listing 3.1: Resolution

# emerge --sync
# emerge --ask --oneshot --verbose ">=net-ftp/gftp-2.0.18-r6"

4.  References


Page updated November 01, 2007

Summary: This is a Gentoo Linux Security Advisory

Security Team
Contact Address

Donate to support our development efforts.

Copyright 2001-2015 Gentoo Foundation, Inc. Questions, Comments? Contact us.