Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <Pine.GSO.4.51.0809301427120.3627@faron.mitre.org>
Date: Tue, 30 Sep 2008 14:28:02 -0400 (EDT)
From: "Steven M. Christey" <coley@...us.mitre.org>
To: oss-security@...ts.openwall.com
Subject: Re: CVE id request: ftpd


CVE-2008-4247 is for *BSD's ftpd; CVE-2008-4242 is for ProFTPD.

- Steve


======================================================
Name: CVE-2008-4242
Status: Candidate
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4242
Reference: CONFIRM:http://bugs.proftpd.org/show_bug.cgi?id=3115
Reference: BID:31289
Reference: URL:http://www.securityfocus.com/bid/31289
Reference: SECUNIA:31930
Reference: URL:http://secunia.com/advisories/31930
Reference: XF:proftpd-url-csrf(45274)
Reference: URL:http://xforce.iss.net/xforce/xfdb/45274

ProFTPD 1.3.1 interprets long commands from an FTP client as multiple
commands, which allows remote attackers to conduct cross-site request
forgery (CSRF) attacks and execute arbitrary FTP commands via a long
ftp:// URI that leverages an existing session from the FTP client
implementation in a web browser.


======================================================
Name: CVE-2008-4247
Status: Candidate
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4247
Reference: MISC:http://bugs.proftpd.org/show_bug.cgi?id=3115
Reference: CONFIRM:http://www.openbsd.org/cgi-bin/cvsweb/src/libexec/ftpd/ftpcmd.y
Reference: CONFIRM:http://www.openbsd.org/cgi-bin/cvsweb/src/libexec/ftpd/ftpcmd.y.diff?r1=1.51&r2=1.52&f=h
Reference: CONFIRM:http://www.openbsd.org/cgi-bin/cvsweb/src/libexec/ftpd/ftpd.c
Reference: CONFIRM:http://www.openbsd.org/cgi-bin/cvsweb/src/libexec/ftpd/ftpd.c.diff?r1=1.183&r2=1.184&f=h
Reference: SECTRACK:1020946
Reference: URL:http://www.securitytracker.com/id?1020946

ftpd in OpenBSD 4.3, FreeBSD 7.0, and NetBSD 4.0 interprets long
commands from an FTP client as multiple commands, which allows remote
attackers to conduct cross-site request forgery (CSRF) attacks and
execute arbitrary FTP commands via a long ftp:// URI that leverages an
existing session from the FTP client implementation in a web browser.


Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.