Quoting from http://www.milw0rm.com/exploits/8097: MLdonkey (up to 2.9.7) has a vulnerability that allows remote user to access any file with rights of running Mldonkey daemon by supplying a special-crafted request (ok, there's not much special about double slash) to an Mldonkey http GUI (tcp/4080 usually). Reference: https://savannah.nongnu.org/bugs/?25667 Thus, the exploit would be as simple as accessing any file on a remote host with your browser and double slash: http://mlhost:4080//etc/passwd
Arches, please test and mark stable: =net-p2p/mldonkey-2.9.7 Target keywords : "amd64 hppa ppc x86"
How exactly does 2.9.7 fix this bug? Also, it is not properly tracked in the Security product.
The security bug is present in MLDonkey >= 2.8.4 to <= 2.9.7 and was fixed today in MLDonkey 3.0.0
http://sourceforge.net/forum/forum.php?forum_id=922717
=net-p2p/mldonkey-3.0.0 in the tree Arches: amd64 hppa ppc x86
Arches, please test and mark stable: =net-p2p/mldonkey-3.0.0 Target keywords : "amd64 hppa ppc x86"
x86 stable
Stable for HPPA.
CVE-2009-0753 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0753): Absolute path traversal vulnerability in MLDonkey 2.8.4 through 2.9.7 allows remote attackers to read arbitrary files via a leading "//" (double slash) in the filename.
amd64 stable
ppc done
Ready for vote, I vote YES.
YES, request filed.
GLSA 200903-36