Joined: 12 May 2004
|Posted: Tue Nov 15, 2016 7:26 am Post subject: [ GLSA 201611-05 ] tnftp
|Gentoo Linux Security Advisory
Title: tnftp: Arbitrary code execution (GLSA 201611-05)
Date: November 15, 2016
tnftp is vulnerable to remote code execution if output file is not
tnftp is a NetBSD FTP client with several advanced features.
Vulnerable: < 20141104
Unaffected: >= 20141104
Architectures: All supported architectures
The fetch_url function in usr.bin/ftp/fetch.c allows remote
attackers to execute arbitrary commands via a
A remote attacker could possibly execute arbitrary code with the
privileges of the process.
There is no known workaround at this time.
All tnftp users should upgrade to the latest version:
|# emerge --sync
# emerge --ask --verbose --oneshot ">=net-ftp/tnftp-20141104"
Last edited by GLSA on Fri Nov 18, 2016 4:17 am; edited 1 time in total