blob: f3bb9f393a4361b9ab84839bd65e6c8b63933af4 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200711-01">
<title>gFTP: Multiple vulnerabilities</title>
Two buffer overflow vulnerabilities have been discovered in fsplib code
used in gFTP.
<product type="ebuild">gftp</product>
<announced>November 01, 2007</announced>
<revised>November 01, 2007: 01</revised>
<package name="net-ftp/gftp" auto="yes" arch="*">
<unaffected range="ge">2.0.18-r6</unaffected>
<vulnerable range="lt">2.0.18-r6</vulnerable>
gFTP is an FTP client for the GNOME desktop environment.
Kalle Olavi Niemitalo discovered two boundary errors in fsplib code
included in gFTP when processing overly long directory or file names.
<impact type="normal">
A remote attacker could trigger these vulnerabilities by enticing a
user to download a file with a specially crafted directory or file
name, possibly resulting in the execution of arbitrary code
(CVE-2007-3962) or a Denial of Service (CVE-2007-3961).
There is no known workaround at this time.
All gFTP users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=net-ftp/gftp-2.0.18-r6&quot;</code>
<uri link="">CVE-2007-3961</uri>
<uri link="">CVE-2007-3962</uri>
<metadata tag="requester" timestamp="Wed, 26 Sep 2007 07:30:16 +0000">
<metadata tag="bugReady" timestamp="Wed, 26 Sep 2007 07:30:24 +0000">
<metadata tag="submitter" timestamp="Wed, 10 Oct 2007 19:23:34 +0000">