Joined: 12 May 2004
|Posted: Sat Oct 08, 2005 4:38 pm Post subject: [ GLSA 200510-09 ] Weex: Format string vulnerability
|Gentoo Linux Security Advisory
Title: Weex: Format string vulnerability (GLSA 200510-09)
Date: October 08, 2005
Weex contains a format string error that may be exploited by malicious servers to execute arbitrary code.
Weex is a non-interactive FTP client typically used to update web pages.
Vulnerable: < 184.108.40.206-r1
Unaffected: >= 220.127.116.11-r1
Architectures: All supported architectures
Ulf Harnhammar discovered a format string bug in Weex that can be triggered when it is first run (or when its cache files are rebuilt, using the -r option).
An attacker could setup a malicious FTP server which, when accessed using Weex, could trigger the format string bug and end up executing arbitrary code with the rights of the user running Weex.
There is no known workaround at this time.
All Weex users should upgrade to the latest version:
|# emerge --sync
# emerge --ask --oneshot --verbose ">=net-ftp/weex-18.104.22.168-r1"
Last edited by GLSA on Thu Jul 30, 2009 4:17 am; edited 5 times in total