In uftpd before 2.12, handle_CWD in ftpcmd.c mishandled the path provided by the user, causing a NULL pointer dereference and denial of service, as demonstrated by a CWD /.. command.
References
Link | Resource |
---|---|
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00052.html | |
https://bugs.gentoo.org/726308 | Patch Third Party Advisory |
https://github.com/troglobit/uftpd/issues/30 | Exploit Third Party Advisory |
https://github.com/troglobit/uftpd/releases/tag/v2.12 | Release Notes Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2020-06-15T16:52:20
Updated: 2020-06-25T17:06:06
Reserved: 2020-06-15T00:00:00
Link: CVE-2020-14149
JSON object: View
NVD Information
Status : Modified
Published: 2020-06-15T18:15:15.147
Modified: 2020-06-25T18:15:12.033
Link: CVE-2020-14149
JSON object: View
Redhat Information
No data.
CWE