GLSA Advocate
![Advocate Advocate](/images/ranks/rank-G-1-advocate.gif)
Joined: 12 May 2004 Posts: 2663
|
Posted: Sat Oct 08, 2005 4:38 pm Post subject: [ GLSA 200510-09 ] Weex: Format string vulnerability |
|
|
Gentoo Linux Security Advisory
Title: Weex: Format string vulnerability (GLSA 200510-09)
Severity: normal
Exploitable: remote
Date: October 08, 2005
Bug(s): #107849
ID: 200510-09
Synopsis
Weex contains a format string error that may be exploited by malicious
servers to execute arbitrary code.
Background
Weex is a non-interactive FTP client typically used to update web
pages.
Affected Packages
Package: net-ftp/weex
Vulnerable: < 2.6.1.5-r1
Unaffected: >= 2.6.1.5-r1
Architectures: All supported architectures
Description
Ulf Harnhammar discovered a format string bug in Weex that can be
triggered when it is first run (or when its cache files are rebuilt,
using the -r option).
Impact
An attacker could setup a malicious FTP server which, when
accessed using Weex, could trigger the format string bug and end up
executing arbitrary code with the rights of the user running Weex.
Workaround
There is no known workaround at this time.
Resolution
All Weex users should upgrade to the latest version:
Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=net-ftp/weex-2.6.1.5-r1" |
References
CAN-2005-3150
Last edited by GLSA on Fri Sep 13, 2013 4:21 am; edited 7 times in total |
|