CERTA-2004-AVI-192
Vulnerability from certfr_avis - Published: - Updated:None
Description
Le client FTP ne gère pas correctement le nom des fichiers commençant par le caractère "|".
Au moyen d'un site FTP astucieusement construit, il est possible de forcer l'exécution de commandes arbitraires sur un poste client utilisant une version vulnérable de la commande FTP.
Solution
Se référer au bulletin de sécurité de l'éditeur (cf. section Documentation) pour l'obtention des correctifs.
HP-UX B.11.00, B.11.11, B.11.22.
Impacted products
| Vendor | Product | Description |
|---|
References
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cp\u003eHP-UX B.11.00, B.11.11, B.11.22.\u003c/p\u003e",
"content": "## Description\n\nLe client FTP ne g\u00e8re pas correctement le nom des fichiers commen\u00e7ant\npar le caract\u00e8re \"\\|\".\n\nAu moyen d\u0027un site FTP astucieusement construit, il est possible de\nforcer l\u0027ex\u00e9cution de commandes arbitraires sur un poste client\nutilisant une version vuln\u00e9rable de la commande FTP.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur (cf. section\nDocumentation) pour l\u0027obtention des correctifs.\n",
"cves": [],
"links": [
{
"title": "Bulletin HPSBUX1050 \"FTP remote unauthorized access\" de HP :",
"url": "http://itrc.hp.com"
},
{
"title": "Note #VU258721 du CERT/CC :",
"url": "http://www.kb.cert.org/vuls/id/258721"
}
],
"reference": "CERTA-2004-AVI-192",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2004-06-11T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
}
],
"summary": null,
"title": "Vuln\u00e9rabilit\u00e9 du client FTP sous HP-UX",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin HPSBUX1050 de HP",
"url": null
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…