gFTP is vulnerable to directory traversal attacks, possibly leading to the creation or overwriting of arbitrary files.
Package | net-ftp/gftp on all architectures |
---|---|
Affected versions | < 2.0.18-r1 |
Unaffected versions | >= 2.0.18-r1 |
gFTP is a GNOME based, multi-threaded file transfer client.
gFTP lacks input validation of filenames received by remote servers.
An attacker could entice a user to connect to a malicious FTP server and conduct a directory traversal attack by making use of specially crafted filenames. This could lead to arbitrary files being created or overwritten.
There is no known workaround at this time.
All gFTP users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-ftp/gftp-2.0.18-r1"
Release date
February 19, 2005
Latest revision
February 19, 2005: 01
Severity
normal
Exploitable
remote
Bugzilla entries