The fetch_url function in usr.bin/ftp/fetch.c in tnftp, as used in NetBSD 5.1 through 5.1.4, 5.2 through 5.2.2, 6.0 through 6.0.6, and 6.1 through 6.1.5 allows remote attackers to execute arbitrary commands via a | (pipe) character at the end of an HTTP redirect.
Version | Base score | Base severity | Vector |
---|
Hyperlink | Resource Type |
---|
The fetch_url function in usr.bin/ftp/fetch.c in tnftp, as used in NetBSD 5.1 through 5.1.4, 5.2 through 5.2.2, 6.0 through 6.0.6, and 6.1 through 6.1.5 allows remote attackers to execute arbitrary commands via a | (pipe) character at the end of an HTTP redirect.
Type | CWE ID | Description |
---|---|---|
text | N/A | n/a |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-013.txt.asc | vendor-advisory x_refsource_NETBSD |
http://secunia.com/advisories/62028 | third-party-advisory x_refsource_SECUNIA |
https://www.exploit-db.com/exploits/43112/ | exploit x_refsource_EXPLOIT-DB |
http://seclists.org/oss-sec/2014/q4/464 | mailing-list x_refsource_MLIST |
http://support.apple.com/HT204244 | x_refsource_CONFIRM |
https://security.gentoo.org/glsa/201611-05 | vendor-advisory x_refsource_GENTOO |
http://lists.opensuse.org/opensuse-updates/2014-11/msg00029.html | vendor-advisory x_refsource_SUSE |
http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html | vendor-advisory x_refsource_APPLE |
http://secunia.com/advisories/62260 | third-party-advisory x_refsource_SECUNIA |
http://seclists.org/oss-sec/2014/q4/459 | mailing-list x_refsource_MLIST |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-013.txt.asc | vendor-advisory x_refsource_NETBSD x_transferred |
http://secunia.com/advisories/62028 | third-party-advisory x_refsource_SECUNIA x_transferred |
https://www.exploit-db.com/exploits/43112/ | exploit x_refsource_EXPLOIT-DB x_transferred |
http://seclists.org/oss-sec/2014/q4/464 | mailing-list x_refsource_MLIST x_transferred |
http://support.apple.com/HT204244 | x_refsource_CONFIRM x_transferred |
https://security.gentoo.org/glsa/201611-05 | vendor-advisory x_refsource_GENTOO x_transferred |
http://lists.opensuse.org/opensuse-updates/2014-11/msg00029.html | vendor-advisory x_refsource_SUSE x_transferred |
http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html | vendor-advisory x_refsource_APPLE x_transferred |
http://secunia.com/advisories/62260 | third-party-advisory x_refsource_SECUNIA x_transferred |
http://seclists.org/oss-sec/2014/q4/459 | mailing-list x_refsource_MLIST x_transferred |
The fetch_url function in usr.bin/ftp/fetch.c in tnftp, as used in NetBSD 5.1 through 5.1.4, 5.2 through 5.2.2, 6.0 through 6.0.6, and 6.1 through 6.1.5 allows remote attackers to execute arbitrary commands via a | (pipe) character at the end of an HTTP redirect.
Date Added | Due Date | Vulnerability Name | Required Action |
---|---|---|---|
N/A |
Type | Version | Base score | Base severity | Vector |
---|---|---|---|---|
Primary | 2.0 | 7.5 | HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |