gFTP: Multiple vulnerabilities — GLSA 200711-01

Two buffer overflow vulnerabilities have been discovered in fsplib code used in gFTP.

Affected packages

net-ftp/gftp on all architectures
Affected versions < 2.0.18-r6
Unaffected versions >= 2.0.18-r6

Background

gFTP is an FTP client for the GNOME desktop environment.

Description

Kalle Olavi Niemitalo discovered two boundary errors in fsplib code included in gFTP when processing overly long directory or file names.

Impact

A remote attacker could trigger these vulnerabilities by enticing a user to download a file with a specially crafted directory or file name, possibly resulting in the execution of arbitrary code (CVE-2007-3962) or a Denial of Service (CVE-2007-3961).

Workaround

There is no known workaround at this time.

Resolution

All gFTP users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=net-ftp/gftp-2.0.18-r6"

References

Release date
November 01, 2007

Latest revision
November 01, 2007: 01

Severity
normal

Exploitable
remote

Bugzilla entries