The the flexible and powerful FTP command-line client lftp is vulnerable to two remote buffer overflows. When using lftp via HTTP or HTTPS to execute commands like ‘ls’ or ‘rels’ specially prepared directories on the server can trigger a buffer overflow in the HTTP handling functions of lftp to possibly execute arbitrary code on the client-side. Please note, to exploit these bugs an attacker has to control the server- side of the context and the attacker will only gain access to the account of the user that is executing lftp.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
openSUSE | 9.0 | i586 | lftp | < 2.6.6-71 | lftp-2.6.6-71.i586.rpm |
openSUSE | 8.2 | i586 | lftp | < 2.6.4-44 | lftp-2.6.4-44.i586.rpm |