cadaver is a command-line WebDAV client that uses inbuilt code from neon,
an HTTP and WebDAV client library.
Versions of the neon client library up to and including 0.24.4 have been
found to contain a number of format string bugs. An attacker could create
a malicious WebDAV server in such a way as to allow arbitrary code
execution on the client should a user connect to it using cadaver. The
Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned
the name CAN-2004-0179 to this issue.
Fix is in cadaver 0.22.1
No metadata -- and latest dev (sethbc) is now inactive.
Any idea who could do it ?
Done and stable on X86. Ready for a GLSA.
GLSA 200404-14 is out -- closing