View | Details | Raw Unified | Return to bug 75782 | Differences between
and this patch

Collapse All | Expand All

(-)vuln.xml (+28 lines)
Lines 32-37 Link Here
32
32
33
-->
33
-->
34
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
34
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
35
  <vuln vid="f92e1bbc-5e18-11d9-839a-0050da134090">
36
    <topic>tnftp -- mget does not check for directory escapes</topic>
37
    <affects>
38
      <packages>
39
        <name>tnftp</name>
40
        <range><eq>20030825</eq></range>
41
      </package>
42
    </affects>
43
    <description>
44
      <body xmlns="http://www.w3.org/1999/xhtml">
45
        <p>When downloading a batch of files from an FTP server the
46
	  mget command does not check for directory escapes.  A
47
	  specially crafted file on the FTP server could then
48
	  potentially overwrite an existing file of the user.</p>
49
      </body>
50
    </description>
51
    <references>
52
	<url>http://tigger.uic.edu/~jlongs2/holes/tnftp.txt</url>
53
	<url>http://cvsweb.netbsd.org/bsdweb.cgi/othersrc/usr.bin/tnftp/src/cmds.c?rev=1.1.1.3&content-type=text/x-cvsweb-markup</url>
54
	<url>http://it.slashdot.org/article.pl?sid=04/12/15/2113202</url>
55
        <mlist msgid="653D74053BA6F54A81ED83DCF969DF08CFA2AA@pivxes1.pivx.com">http://marc.theaimsgroup.com/?l=bugtraq&amp;m=110321888413132</mlist>
56
    </references>
57
    <dates>
58
      <discovery>2004-12-15</discovery>
59
      <entry>2005-01-04</entry>
60
    </dates>
61
  </vuln>
62
35
  <vuln vid="877e918e-5362-11d9-96d4-00065be4b5b6">
63
  <vuln vid="877e918e-5362-11d9-96d4-00065be4b5b6">
36
    <topic>mpg123 -- playlist processing buffer overflow vulnerability</topic>
64
    <topic>mpg123 -- playlist processing buffer overflow vulnerability</topic>
37
    <affects>
65
    <affects>

Return to bug 75782