Lines 32-37
Link Here
|
32 |
|
32 |
|
33 |
--> |
33 |
--> |
34 |
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> |
34 |
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> |
|
|
35 |
<vuln vid="f92e1bbc-5e18-11d9-839a-0050da134090"> |
36 |
<topic>tnftp -- mget does not check for directory escapes</topic> |
37 |
<affects> |
38 |
<packages> |
39 |
<name>tnftp</name> |
40 |
<range><eq>20030825</eq></range> |
41 |
</package> |
42 |
</affects> |
43 |
<description> |
44 |
<body xmlns="http://www.w3.org/1999/xhtml"> |
45 |
<p>When downloading a batch of files from an FTP server the |
46 |
mget command does not check for directory escapes. A |
47 |
specially crafted file on the FTP server could then |
48 |
potentially overwrite an existing file of the user.</p> |
49 |
</body> |
50 |
</description> |
51 |
<references> |
52 |
<url>http://tigger.uic.edu/~jlongs2/holes/tnftp.txt</url> |
53 |
<url>http://cvsweb.netbsd.org/bsdweb.cgi/othersrc/usr.bin/tnftp/src/cmds.c?rev=1.1.1.3&content-type=text/x-cvsweb-markup</url> |
54 |
<url>http://it.slashdot.org/article.pl?sid=04/12/15/2113202</url> |
55 |
<mlist msgid="653D74053BA6F54A81ED83DCF969DF08CFA2AA@pivxes1.pivx.com">http://marc.theaimsgroup.com/?l=bugtraq&m=110321888413132</mlist> |
56 |
</references> |
57 |
<dates> |
58 |
<discovery>2004-12-15</discovery> |
59 |
<entry>2005-01-04</entry> |
60 |
</dates> |
61 |
</vuln> |
62 |
|
35 |
<vuln vid="877e918e-5362-11d9-96d4-00065be4b5b6"> |
63 |
<vuln vid="877e918e-5362-11d9-96d4-00065be4b5b6"> |
36 |
<topic>mpg123 -- playlist processing buffer overflow vulnerability</topic> |
64 |
<topic>mpg123 -- playlist processing buffer overflow vulnerability</topic> |
37 |
<affects> |
65 |
<affects> |