Joined: 12 May 2004
|Posted: Sat Oct 08, 2005 4:38 pm Post subject: [ GLSA 200510-09 ] Weex: Format string vulnerability
|Gentoo Linux Security Advisory
Title: Weex: Format string vulnerability (GLSA 200510-09)
Date: October 08, 2005
Weex contains a format string error that may be exploited by malicious
servers to execute arbitrary code.
Weex is a non-interactive FTP client typically used to update web
Vulnerable: < 126.96.36.199-r1
Unaffected: >= 188.8.131.52-r1
Architectures: All supported architectures
Ulf Harnhammar discovered a format string bug in Weex that can be
triggered when it is first run (or when its cache files are rebuilt,
using the -r option).
An attacker could setup a malicious FTP server which, when
accessed using Weex, could trigger the format string bug and end up
executing arbitrary code with the rights of the user running Weex.
There is no known workaround at this time.
All Weex users should upgrade to the latest version:
|# emerge --sync
# emerge --ask --oneshot --verbose ">=net-ftp/weex-184.108.40.206-r1"
Last edited by GLSA on Fri Sep 13, 2013 4:21 am; edited 7 times in total