blob: 1bdaf21cccac6af939bc0911dd0b7a95c509409a [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200504-09">
<title>Axel: Vulnerability in HTTP redirection handling</title>
A buffer overflow vulnerability has been found in Axel which could lead to
the execution of arbitrary code.
<product type="ebuild">Axel</product>
<announced>April 12, 2005</announced>
<revised>April 12, 2005: 01</revised>
<package name="net-misc/axel" auto="yes" arch="*">
<unaffected range="ge">1.0b</unaffected>
<vulnerable range="lt">1.0b</vulnerable>
Axel is a console-based FTP/HTTP download accelerator.
A possible buffer overflow has been reported in the HTTP
redirection handling code in conn.c.
<impact type="normal">
A remote attacker could exploit this vulnerability by setting up a
malicious site and enticing a user to connect to it. This could
possibly lead to the execution of arbitrary code with the permissions
of the user running Axel.
There is no known workaround at this time.
All Axel users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=net-misc/axel-1.0b&quot;</code>
<uri link="">CAN-2005-0390</uri>
<metadata tag="requester" timestamp="Mon, 11 Apr 2005 18:36:13 +0000">
<metadata tag="submitter" timestamp="Mon, 11 Apr 2005 19:29:05 +0000">
<metadata tag="bugReady" timestamp="Tue, 12 Apr 2005 11:48:11 +0000">