Two buffer overflow vulnerabilities have been discovered in fsplib code used in gFTP.
Package | net-ftp/gftp on all architectures |
---|---|
Affected versions | < 2.0.18-r6 |
Unaffected versions | >= 2.0.18-r6 |
gFTP is an FTP client for the GNOME desktop environment.
Kalle Olavi Niemitalo discovered two boundary errors in fsplib code included in gFTP when processing overly long directory or file names.
A remote attacker could trigger these vulnerabilities by enticing a user to download a file with a specially crafted directory or file name, possibly resulting in the execution of arbitrary code (CVE-2007-3962) or a Denial of Service (CVE-2007-3961).
There is no known workaround at this time.
All gFTP users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-ftp/gftp-2.0.18-r6"
Release date
November 01, 2007
Latest revision
November 01, 2007: 01
Severity
normal
Exploitable
remote
Bugzilla entries