GLSA Administrator
![Administrator Administrator](/images/ranks/rank-admin.gif)
![](images/avatars/3896974784c480ee5977f8.gif)
Joined: 27 Jun 2003 Posts: 4983 Location: Gothenburg, Sweden
|
Posted: Tue Apr 12, 2005 8:54 pm Post subject: [ GLSA 200504-09 ] Axel: Vulnerability in HTTP redirection h |
|
|
Gentoo Linux Security Advisory
Title: Axel: Vulnerability in HTTP redirection handling (GLSA 200504-09)
Severity: normal
Exploitable: remote
Date: April 12, 2005
Bug(s): #88264
ID: 200504-09
Synopsis
A buffer overflow vulnerability has been found in Axel which could lead to the execution of arbitrary code.
Background
Axel is a console-based FTP/HTTP download accelerator.
Affected Packages
Package: net-misc/axel
Vulnerable: < 1.0b
Unaffected: >= 1.0b
Architectures: All supported architectures
Description
A possible buffer overflow has been reported in the HTTP redirection handling code in conn.c.
Impact
A remote attacker could exploit this vulnerability by setting up a malicious site and enticing a user to connect to it. This could possibly lead to the execution of arbitrary code with the permissions of the user running Axel.
Workaround
There is no known workaround at this time.
Resolution
All Axel users should upgrade to the latest version: Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=net-misc/axel-1.0b" |
References
CAN-2005-0390
Last edited by GLSA on Sun Jul 30, 2006 4:17 am; edited 5 times in total |
|