Vulnerability CVE-2014-8517


Published: 2014-11-17

Description:
The fetch_url function in usr.bin/ftp/fetch.c in tnftp, as used in NetBSD 5.1 through 5.1.4, 5.2 through 5.2.2, 6.0 through 6.0.6, and 6.1 through 6.1.5 allows remote attackers to execute arbitrary commands via a | (pipe) character at the end of an HTTP redirect.

See advisories in our WLB2 database:
Topic
Author
Date
High
MacOS X 10.10 & FreeBSD10 ftp Remote Comand Execution
Jared Mcneill
28.10.2014
High
tnftp in MacOS X 10.10 & FreeBSD10 Remote Comand Execution Exploit
dash
04.12.2014

CVSS2 => (AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
7.5/10
6.4/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
Netbsd -> Netbsd 
Apple -> Mac os x 

 References:
http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-013.txt.asc
http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html
http://lists.opensuse.org/opensuse-updates/2014-11/msg00029.html
http://seclists.org/oss-sec/2014/q4/459
http://seclists.org/oss-sec/2014/q4/464
http://support.apple.com/HT204244
https://security.gentoo.org/glsa/201611-05
https://www.exploit-db.com/exploits/43112/

Copyright 2022, cxsecurity.com

 

Back to Top