Gentoo Logo

gFTP: Multiple vulnerabilities

Content:

1.  Gentoo Linux Security Advisory

Version Information

Advisory Reference GLSA 200711-01 / gftp
Release Date November 01, 2007
Latest Revision November 01, 2007: 01
Impact normal
Exploitable remote
Package Vulnerable versions Unaffected versions Architecture(s)
net-ftp/gftp < 2.0.18-r6 >= 2.0.18-r6 All supported architectures

Related bugreports: #188252

Synopsis

Two buffer overflow vulnerabilities have been discovered in fsplib code used in gFTP.

2.  Impact Information

Background

gFTP is an FTP client for the GNOME desktop environment.

Description

Kalle Olavi Niemitalo discovered two boundary errors in fsplib code included in gFTP when processing overly long directory or file names.

Impact

A remote attacker could trigger these vulnerabilities by enticing a user to download a file with a specially crafted directory or file name, possibly resulting in the execution of arbitrary code (CVE-2007-3962) or a Denial of Service (CVE-2007-3961).

3.  Resolution Information

Workaround

There is no known workaround at this time.

Resolution

All gFTP users should upgrade to the latest version:

Code Listing 3.1: Resolution

# emerge --sync
# emerge --ask --oneshot --verbose ">=net-ftp/gftp-2.0.18-r6"

4.  References



Print

Page updated November 01, 2007

Summary: This is a Gentoo Linux Security Advisory

Security Team
Contact Address

Donate to support our development efforts.

Copyright 2001-2014 Gentoo Foundation, Inc. Questions, Comments? Contact us.