Lucene search

K
gentooGentoo FoundationGLSA-201611-05
HistoryNov 15, 2016 - 12:00 a.m.

tnftp: Arbitrary code execution

2016-11-1500:00:00
Gentoo Foundation
security.gentoo.org
35

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.959 High

EPSS

Percentile

99.5%

Background

tnftp is a NetBSD FTP client with several advanced features.

Description

The fetch_url function in usr.bin/ftp/fetch.c allows remote attackers to execute arbitrary commands via a

Impact

A remote attacker could possibly execute arbitrary code with the privileges of the process.

Workaround

There is no known workaround at this time.

Resolution

All tnftp users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --verbose --oneshot ">=net-ftp/tnftp-20141104"
OSVersionArchitecturePackageVersionFilename
Gentooanyallnet-ftp/tnftp< 20141104UNKNOWN

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.959 High

EPSS

Percentile

99.5%