|
Message-Id: <20141029014732.5F6EEABC080@smtpvmsrv1.mitre.org> Date: Tue, 28 Oct 2014 21:47:32 -0400 (EDT) From: cve-assign@...re.org To: agc@...bsd.org Cc: cve-assign@...re.org, oss-security@...ts.openwall.com, security-officer@...bsd.org Subject: Re: ftp(1) can be made execute arbitrary commands by malicious webserver -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 > tnftp(1) is quite widely used > fixes were committed to the NetBSD repo > src/usr.bin/ftp: fetch.c > don't pay attention to special characters if they don't come from the > command line > FreeBSD and Dragonfly have been informed, as has Apple, and I have > received a boilerplate reply from Apple. The issue is present in > 10.10 (Yosemite). > the ftp program can be tricked into executing arbitrary commands > The FTP client will follow HTTP redirects > Location: http://192.168.2.19/cgi-bin/|uname%20-a Use CVE-2014-8517. - -- CVE assignment team, MITRE CVE Numbering Authority M/S M300 202 Burlington Road, Bedford, MA 01730 USA [ PGP key available through http://cve.mitre.org/cve/request_id.html ] -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.14 (SunOS) iQEcBAEBAgAGBQJUUEZbAAoJEKllVAevmvmsFqkH/0l318cymZYupoZxrqFIuODh GTbK/XCDv5ZSyUHseRVh2iGQb9dXnBO+tgS//3MnAxFSd2+GpD5Fltd8oPf1WNw2 0vcmjo8onqMtX9CU5ssh6qftOhR+VAYnf4fIybl9x1WZIV2aEJL1xnhbfeoXnbSr VMG+6MGDKvUA+2GTnBfuW/jvsuMuX0drAzY7YExDXnxNA9Ef/ovD0mf4jJUjikL1 9fLgDgAgFXd4oQpRSuEGrsBMwLsKwwkUfWidnrI9nyEMOVI/U6ElU+Sl185uiAYl WW/eHNkCiYhJXwbZDz9Tv4QmN2S1/w/ZZreplNzS3w+eHBh/asHx5+7MAni2Q8Q= =Ef6C -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.