Executive Summary

Summary
TitleNew lftp packages fix file overwrite vulnerability
Informations
NameDSA-2085First vendor Publication2010-08-03
VendorDebianLast vendor Modification2010-08-03
Severity (Vendor) N/ARevision1

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Cvss Base Score7.5Attack RangeNetwork
Cvss Impact Score6.4Attack ComplexityLow
Cvss Expoit Score10AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Detail

It was discovered that in lftp, a command-line HTTP/FTP client, there is no proper validation of the filename provided by the server through the Content-Disposition header; attackers can use this flaw by suggesting a filename they wish to overwrite on the client machine, and then possibly execute arbitrary code (for instance if the attacker elects to write a dotfile in a home directory).

For the stable distribution (lenny), this problem has been fixed in version 3.7.3-1+lenny1.

For the testing distribution (squeeze), this problem has been fixed in version 4.0.6-1.

For the unstable distribution (sid), this problem has been fixed in version 4.0.6-1.

We recommend that you upgrade your lftp packages.

Original Source

Url : http://www.debian.org/security/2010/dsa-2085

CWE : Common Weakness Enumeration

idName
CWE-20Improper Input Validation

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:22074
 
Oval ID: oval:org.mitre.oval:def:22074
Title: RHSA-2010:0585: lftp security update (Moderate)
Description: The get1 command, as used by lftpget, in LFTP before 4.0.6 does not properly validate a server-provided filename before determining the destination filename of a download, which allows remote servers to create or overwrite arbitrary files via a Content-Disposition header that suggests a crafted filename, and possibly execute arbitrary code as a consequence of writing to a dotfile in a home directory.
Family: unix Class: patch
Reference(s): RHSA-2010:0585-01
CESA-2010:0585
CVE-2010-2251
Version: 4
Platform(s): Red Hat Enterprise Linux 5
CentOS Linux 5
Product(s): lftp
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:13484
 
Oval ID: oval:org.mitre.oval:def:13484
Title: USN-984-1 -- lftp vulnerability
Description: It was discovered that LFTP incorrectly filtered filenames suggested by Content-Disposition headers. If a user or automated system were tricked into downloading a file from a malicious site, a remote attacker could create the file with an arbitrary name, such as a dotfile, and possibly run arbitrary code.
Family: unix Class: patch
Reference(s): USN-984-1
CVE-2010-2251
Version: 5
Platform(s): Ubuntu 8.04
Ubuntu 10.04
Ubuntu 9.04
Ubuntu 9.10
Product(s): lftp
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:12796
 
Oval ID: oval:org.mitre.oval:def:12796
Title: DSA-2085-1 lftp -- missing input validation
Description: It was discovered that in lftp, a command-line HTTP/FTP client, there is no proper validation of the filename provided by the server through the Content-Disposition header; attackers can use this flaw by suggesting a filename they wish to overwrite on the client machine, and then possibly execute arbitrary code. For the stable distribution, this problem has been fixed in version 3.7.3-1+lenny1. For the testing distribution, this problem has been fixed in version 4.0.6-1. For the unstable distribution, this problem has been fixed in version 4.0.6-1. We recommend that you upgrade your lftp packages.
Family: unix Class: patch
Reference(s): DSA-2085-1
CVE-2010-2251
Version: 5
Platform(s): Debian GNU/Linux 5.0
Product(s): lftp
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:22803
 
Oval ID: oval:org.mitre.oval:def:22803
Title: ELSA-2010:0585: lftp security update (Moderate)
Description: The get1 command, as used by lftpget, in LFTP before 4.0.6 does not properly validate a server-provided filename before determining the destination filename of a download, which allows remote servers to create or overwrite arbitrary files via a Content-Disposition header that suggests a crafted filename, and possibly execute arbitrary code as a consequence of writing to a dotfile in a home directory.
Family: unix Class: patch
Reference(s): ELSA-2010:0585-01
CVE-2010-2251
Version: 6
Platform(s): Oracle Linux 5
Product(s): lftp
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:28103
 
Oval ID: oval:org.mitre.oval:def:28103
Title: ELSA-2010-0585 -- lftp security update (moderate)
Description: [3.7.11-4.el5_5.3] - Related: CVE-2010-2251 - document change of xfer:clobber default value in manpage, respect xfer:clobber on with xfer:auto-rename on (old behaviour) [3.7.11-4.el5_5.2] - Related: CVE-2010-2251 - describe new option xfer:auto-rename which could restore old behaviour in manpage [3.7.11-4.el5_5.1] - Resolves: CVE-2010-2251 - multiple HTTP client download filename vulnerability (#617870)
Family: unix Class: patch
Reference(s): ELSA-2010-0585
CVE-2010-2251
Version: 1
Platform(s): Oracle Linux 5
Product(s): lftp
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application142

OpenVAS Exploits

DateDescription
2011-08-09Name : CentOS Update for lftp CESA-2010:0585 centos5 i386
File : nvt/gb_CESA-2010_0585_lftp_centos5_i386.nasl
2010-10-10Name : FreeBSD Ports: lftp
File : nvt/freebsd_lftp0.nasl
2010-09-10Name : Ubuntu Update for lftp vulnerability USN-984-1
File : nvt/gb_ubuntu_USN_984_1.nasl
2010-08-21Name : Debian Security Advisory DSA 2085-1 (lftp)
File : nvt/deb_2085_1.nasl
2010-08-06Name : RedHat Update for lftp RHSA-2010:0585-01
File : nvt/gb_RHSA-2010_0585-01_lftp.nasl
2010-07-12Name : Mandriva Update for lftp MDVSA-2010:128 (lftp)
File : nvt/gb_mandriva_MDVSA_2010_128.nasl
2010-07-02Name : Fedora Update for lftp FEDORA-2010-9819
File : nvt/gb_fedora_2010_9819_lftp_fc12.nasl
2010-04-29Name : Mandriva Update for epiphany MDVA-2010:128 (epiphany)
File : nvt/gb_mandriva_MDVA_2010_128.nasl
2010-04-29Name : Mandriva Update for epiphany MDVA-2010:128-1 (epiphany)
File : nvt/gb_mandriva_MDVA_2010_128_1.nasl

Open Source Vulnerability Database (OSVDB)

idDescription
64713LFTP lftpget get1 Command Content-Disposition Header Suggested Filename Arbit...

Nessus® Vulnerability Scanner

DateDescription
2013-07-12Name : The remote Oracle Linux host is missing a security update.
File : oraclelinux_ELSA-2010-0585.nasl - Type : ACT_GATHER_INFO
2012-08-01Name : The remote Scientific Linux host is missing a security update.
File : sl_20100802_lftp_for_SL_5.nasl - Type : ACT_GATHER_INFO
2010-09-08Name : The remote Ubuntu host is missing a security-related patch.
File : ubuntu_USN-984-1.nasl - Type : ACT_GATHER_INFO
2010-09-04Name : The remote FreeBSD host is missing a security-related update.
File : freebsd_pkg_29b7e3f4b6a911dfae63f255a795cb21.nasl - Type : ACT_GATHER_INFO
2010-08-05Name : The remote Debian host is missing a security-related update.
File : debian_DSA-2085.nasl - Type : ACT_GATHER_INFO
2010-08-03Name : The remote Red Hat host is missing a security update.
File : redhat-RHSA-2010-0585.nasl - Type : ACT_GATHER_INFO
2010-08-03Name : The remote CentOS host is missing a security update.
File : centos_RHSA-2010-0585.nasl - Type : ACT_GATHER_INFO
2010-07-30Name : The remote Mandriva Linux host is missing one or more security updates.
File : mandriva_MDVSA-2010-128.nasl - Type : ACT_GATHER_INFO
2010-07-01Name : The remote Fedora host is missing a security update.
File : fedora_2010-9819.nasl - Type : ACT_GATHER_INFO
2010-06-23Name : The remote openSUSE host is missing a security update.
File : suse_11_2_lftp-100610.nasl - Type : ACT_GATHER_INFO
2010-06-23Name : The remote openSUSE host is missing a security update.
File : suse_11_1_lftp-100610.nasl - Type : ACT_GATHER_INFO
2010-06-23Name : The remote openSUSE host is missing a security update.
File : suse_11_0_lftp-100610.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
DateInformations
2014-02-17 11:29:34
  • Multiple Updates