Summary: | net-ftp/lftp <3.5.9 user assisted code execution (CVE-2007-2348) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Daniel Black (RETIRED) <dragonheart> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | ||
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://lftp.yar.ru/ | ||
Whiteboard: | B2? [noglsa] jaervosz | ||
Package list: | Runtime testing required: | --- |
Description
Daniel Black (RETIRED)
![]() Thx Daniel. Arches please test and mark stable. ia64 + x86 stable 3.5.10 stable on amd64 Stable for HPPA. sparc stable. ppc64 stable alpha stable. +extra points to Daniel for providing instructions to test! you r0lz. ppc stable i'm late but i really don't consider this as a security issue when i'm reading the manpage. "Mirror --script" is not actually dangerous. Running "mirror --script" then run the generated script without reading it is stupid. BTW it'll be CVE-2007-2348 @falco: one thing is a script that executes FTP commands another is when it can execute arbitrary commands. Just because the script file is plaintext doesn't mean everybody will check it before running it. Since there has been some discussion about wether this is a feature or a security issue, I'm calling a GLSA vote. script seems only intended to run ftp commands. going further to arbitrary shell commands seems to be an unintentional priv escalation. Depending on the command given this could allow a remote shell in where there wasn't before. so i'm saying go glsa=yes. This is either a non-issue or it hasn't been fixed, since you can already drop to a shell from the lftp script (append a line starting with ! and then your shell commands, confirmed on 3.5.10). There's essentially no difference between running an untrusted lftp script and running an untrusted bash script. Even without the shell commands, it would be pretty trivial for an untrusted lftp script to do things like overwrite local files (cron, .bash_profile, etc) to gain code execution as the user. There's not really any way around this that I see. I vote no, by the way. :) /vote NO. Two NO votes -> closing with NO GLSA. Feel free to reopen if you disagree. |