ID

VAR-201411-0457


CVE

CVE-2014-8517


TITLE

NetBSD Used in tnftp of usr.bin/ftp/fetch.c Inside fetch_url Arbitrary command execution vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2014-005490

DESCRIPTION

The fetch_url function in usr.bin/ftp/fetch.c in tnftp, as used in NetBSD 5.1 through 5.1.4, 5.2 through 5.2.2, 6.0 through 6.0.6, and 6.1 through 6.1.5 allows remote attackers to execute arbitrary commands via a | (pipe) character at the end of an HTTP redirect. Supplementary information : CWE Vulnerability type by CWE-77: Improper Neutralization of Special Elements used in a Command ( Command injection ) Has been identified. tnftp is prone to a remote arbitrary command-execution. An attacker can exploit this issue to execute arbitrary commands in the context of the affected application. NetBSD is a free and open source Unix-like operating system developed by the NetBSD Foundation. The following versions are affected: NetBSD 5.1 to 5.1.4, 5.2 to 5.2.2, 6.0 to 6.0.6, 6.1 to 6.1.5. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201611-05 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - https://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: tnftp: Arbitrary code execution Date: November 15, 2016 Bugs: #527302 ID: 201611-05 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== tnftp is vulnerable to remote code execution if output file is not specified. Resolution ========== All tnftp users should upgrade to the latest version: <code> # emerge --sync # emerge --ask --verbose --oneshot ">=net-ftp/tnftp-20141104" References ========== [ 1 ] CVE-2014-8517 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8517 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: https://security.gentoo.org/glsa/201611-05 Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2016 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5 . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 ============================================================================= FreeBSD-SA-14:26.ftp Security Advisory The FreeBSD Project Topic: Remote command execution in ftp(1) Category: core Module: ftp Announced: 2014-11-04 Credits: Jared McNeill, Alistair Crooks Affects: All supported versions of FreeBSD. Corrected: 2014-11-04 23:29:57 UTC (stable/10, 10.1-PRERELEASE) 2014-11-04 23:34:46 UTC (releng/10.1, 10.1-RC4-p1) 2014-11-04 23:34:46 UTC (releng/10.1, 10.1-RC3-p1) 2014-11-04 23:34:46 UTC (releng/10.1, 10.1-RC2-p3) 2014-11-04 23:31:17 UTC (releng/10.0, 10.0-RELEASE-p12) 2014-11-04 23:30:47 UTC (stable/9, 9.3-STABLE) 2014-11-04 23:33:46 UTC (releng/9.3, 9.3-RELEASE-p5) 2014-11-04 23:33:17 UTC (releng/9.2, 9.2-RELEASE-p15) 2014-11-04 23:32:45 UTC (releng/9.1, 9.1-RELEASE-p22) 2014-11-04 23:30:23 UTC (stable/8, 8.4-STABLE) 2014-11-04 23:32:15 UTC (releng/8.4, 8.4-RELEASE-p19) CVE Name: CVE-2014-8517 For general information regarding FreeBSD Security Advisories, including descriptions of the fields above, security branches, and the following sections, please visit <URL:http://security.FreeBSD.org/>. I. Background The ftp(1) userland utility is an interactive FTP client. It can also be used non-interactively, by providing a URL on the command line. In this mode, it supports HTTP in addition to FTP. II. III. Impact When operating on HTTP URIs, the ftp(1) client follows HTTP redirects, and uses the part of the path after the last '/' from the last resource it accesses as the output filename if '-o' is not specified. IV. Workaround No workaround is available. Users are encouraged to replace ftp(1) in non-interactive use by either fetch(1) or a third-party client such as curl or wget. V. Solution Perform one of the following: 1) Upgrade your vulnerable system to a supported FreeBSD stable or release / security branch (releng) dated after the correction date. 2) To update your vulnerable system via a binary patch: Systems running a RELEASE version of FreeBSD on the i386 or amd64 platforms can be updated via the freebsd-update(8) utility: # freebsd-update fetch # freebsd-update install 3) To update your vulnerable system via a source code patch: The following patches have been verified to apply to the applicable FreeBSD release branches. a) Download the relevant patch from the location below, and verify the detached PGP signature using your PGP utility. [FreeBSD 8] # fetch http://security.FreeBSD.org/patches/SA-14:26/ftp-8.patch # fetch http://security.FreeBSD.org/patches/SA-14:26/ftp-8.patch.asc # gpg --verify ftp-8.patch.asc [All other versions] # fetch http://security.FreeBSD.org/patches/SA-14:26/ftp.patch # fetch http://security.FreeBSD.org/patches/SA-14:26/ftp.patch.asc # gpg --verify ftp.patch.asc b) Apply the patch. Execute the following commands as root: # cd /usr/src # patch < /path/to/patch c) Recompile ftp. Execute the following commands as root: # cd /usr/src/usr.bin/ftp # make && make install VI. Correction details The following list contains the correction revision numbers for each affected branch. Branch/path Revision - ------------------------------------------------------------------------- stable/8/ r274108 releng/8.4/ r274111 stable/9/ r274109 releng/9.1/ r274112 releng/9.2/ r274113 releng/9.3/ r274114 stable/10/ r274107 releng/10.0/ r274110 releng/10.1/ r274115 - ------------------------------------------------------------------------- To see which files were modified by a particular revision, run the following command, replacing NNNNNN with the revision number, on a machine with Subversion installed: # svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base Or visit the following URL, replacing NNNNNN with the revision number: <URL:http://svnweb.freebsd.org/base?view=revision&revision=NNNNNN> VII. References <URL:http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8517> The latest revision of this advisory is available at <URL:http://security.FreeBSD.org/advisories/FreeBSD-SA-14:26.ftpd.asc> -----BEGIN PGP SIGNATURE----- iQIcBAEBCgAGBQJUWWUQAAoJEO1n7NZdz2rnhUwP+wQKrgKs6lRk6Yl4UtRyEwyG BHGkA62oaQbehuccahjQgIcLTk3Vp3AalXtSQpdyWJktHiYrFwBnheW/IrhJ6bMS dpJv3yqqQtSED9sADf+GAvxV6TG9bknq/RDxXKpsQ/MocYbiVxz/3nDOMz9CB7ep saDttvGHW7RUmNoKL70pgItGapiVuBzMF01PCZ2SmFiJHYi7BoiJwm72Y1NLU8YE TkiX2ZAoTVMN5/R3DW38HyVCyeY2tMTHSdQXRSYjwzJ0gEbBPWMPQyB1SAa8dtk5 j54KFNOBoaXMjd3USqFgo0fduU3rGZp5PwITTx5Rx5Ixtz2vHddyOISV0RcjA0cq TWDwBGlKET7qZ1j7nHTgy4U4wMTWFbkjjqEY+RHYywaAmy8ACDmEUci8d3fWKWVY d4y8RCvBrlnFVjmNiNcBc5XFXxY0Ra3BQ8C/VE0k0ZFuzmFUCi+DJZDR2Gtl0R9Q 1hAdj+yOJo46ylHPiSyoBZmsRZccV1a81phOPe0mPR84BvzNvBsdI+EFIJWi+5bw bjuSM8YCOHrlGkqh9h9+BizvLfJFpjUSglwzPmOfRpTv59XJpc6D1Hia+uICTEfd lSiJgDZ6enozY7QVoiO7G/ycyQCVe7Ehwywx/dpWXVpva85tn4Xl2khBCiPNbBBo xnPjqxmwGK+4uegsO6CY =QT3h -----END PGP SIGNATURE-----

Trust: 2.16

sources: NVD: CVE-2014-8517 // JVNDB: JVNDB-2014-005490 // BID: 70792 // VULHUB: VHN-76462 // PACKETSTORM: 139730 // PACKETSTORM: 128981

AFFECTED PRODUCTS

vendor:applemodel:mac os xscope:eqversion:10.10.1

Trust: 1.8

vendor:applemodel:mac os xscope:eqversion:10.8.5

Trust: 1.8

vendor:applemodel:mac os xscope:eqversion:10.9.5

Trust: 1.8

vendor:netbsdmodel:netbsdscope:eqversion:6.0.3

Trust: 1.6

vendor:netbsdmodel:netbsdscope:eqversion:6.1.2

Trust: 1.6

vendor:netbsdmodel:netbsdscope:eqversion:6.1.5

Trust: 1.6

vendor:netbsdmodel:netbsdscope:eqversion:6.1

Trust: 1.6

vendor:netbsdmodel:netbsdscope:eqversion:6.1.4

Trust: 1.6

vendor:netbsdmodel:netbsdscope:eqversion:6.0.5

Trust: 1.6

vendor:netbsdmodel:netbsdscope:eqversion:6.0.6

Trust: 1.6

vendor:netbsdmodel:netbsdscope:eqversion:6.1.3

Trust: 1.6

vendor:netbsdmodel:netbsdscope:eqversion:6.1.1

Trust: 1.6

vendor:netbsdmodel:netbsdscope:eqversion:6.0.4

Trust: 1.6

vendor:netbsdmodel:netbsdscope:eqversion:5.1.3

Trust: 1.0

vendor:netbsdmodel:netbsdscope:eqversion:5.1.4

Trust: 1.0

vendor:netbsdmodel:netbsdscope:eqversion:5.2.1

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.10.0

Trust: 1.0

vendor:netbsdmodel:netbsdscope:eqversion:5.2

Trust: 1.0

vendor:netbsdmodel:netbsdscope:eqversion:5.1

Trust: 1.0

vendor:netbsdmodel:netbsdscope:eqversion:6.0.1

Trust: 1.0

vendor:netbsdmodel:netbsdscope:eqversion:5.2.2

Trust: 1.0

vendor:netbsdmodel:netbsdscope:eqversion:5.1.1

Trust: 1.0

vendor:netbsdmodel:netbsdscope:eqversion:5.1.2

Trust: 1.0

vendor:netbsdmodel:netbsdscope:eqversion:6.0.2

Trust: 1.0

vendor:netbsdmodel:netbsdscope:eqversion:6.0

Trust: 1.0

vendor:netbsdmodel:netbsdscope:eqversion:5.1 to 5.1.4

Trust: 0.8

vendor:netbsdmodel:netbsdscope:eqversion:5.2 to 5.2.2

Trust: 0.8

vendor:netbsdmodel:netbsdscope:eqversion:6.0 to 6.0.6

Trust: 0.8

vendor:netbsdmodel:netbsdscope:eqversion:6.1 to 6.1.5

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:10.10

Trust: 0.8

vendor:freebsdmodel:rc2scope:eqversion:9.2

Trust: 0.3

vendor:freebsdmodel:10.0-release-p6scope: - version: -

Trust: 0.3

vendor:freebsdmodel:10.1-prereleasescope:neversion: -

Trust: 0.3

vendor:freebsdmodel:8.4-release-p12scope: - version: -

Trust: 0.3

vendor:freebsdmodel:10.0-betascope: - version: -

Trust: 0.3

vendor:freebsdmodel:10.0-release-p2scope: - version: -

Trust: 0.3

vendor:freebsdmodel:10.1-rc4-p1scope:neversion: -

Trust: 0.3

vendor:freebsdmodel:9.1-release-p15scope: - version: -

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:4.10

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:9.3

Trust: 0.3

vendor:freebsdmodel:8.4-release-p8scope: - version: -

Trust: 0.3

vendor:freebsdmodel:prereleasescope:eqversion:9.2

Trust: 0.3

vendor:freebsdmodel:9.1-stablescope: - version: -

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.10

Trust: 0.3

vendor:freebsdmodel:9.1-rc1scope: - version: -

Trust: 0.3

vendor:freebsdmodel:9.3-prereleasescope: - version: -

Trust: 0.3

vendor:applemodel:mac osscope:neversion:x10.10.2

Trust: 0.3

vendor:freebsdmodel:9.3-rcscope: - version: -

Trust: 0.3

vendor:freebsdmodel:9.3-beta1scope: - version: -

Trust: 0.3

vendor:freebsdmodel:9.2-relengscope: - version: -

Trust: 0.3

vendor:freebsdmodel:8.4-release-p13scope: - version: -

Trust: 0.3

vendor:freebsdmodel:9.1-release-p20scope: - version: -

Trust: 0.3

vendor:freebsdmodel:9.2-rc3-p1scope: - version: -

Trust: 0.3

vendor:freebsdmodel:8.4-relengscope: - version: -

Trust: 0.3

vendor:freebsdmodel:8.4-release-p17scope: - version: -

Trust: 0.3

vendor:freebsdmodel:10.1-rc2-p1scope: - version: -

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.10.1

Trust: 0.3

vendor:freebsdmodel:9.1-release-p1scope: - version: -

Trust: 0.3

vendor:freebsdmodel:10.0-rc3-p1scope: - version: -

Trust: 0.3

vendor:freebsdmodel:8.4-release-p19scope:neversion: -

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:10.0

Trust: 0.3

vendor:freebsdmodel:10.1-rc3-p1scope:neversion: -

Trust: 0.3

vendor:freebsdmodel:9.3-release-p2scope: - version: -

Trust: 0.3

vendor:freebsdmodel:8.4-release-p9scope: - version: -

Trust: 0.3

vendor:freebsdmodel:9.2-release-p4scope: - version: -

Trust: 0.3

vendor:freebsdmodel:10.0-release-p12scope:neversion: -

Trust: 0.3

vendor:freebsdmodel:9.3-stablescope:neversion: -

Trust: 0.3

vendor:freebsdmodel:9.2-rc2-p2scope: - version: -

Trust: 0.3

vendor:freebsdmodel:10.0-release-p8scope: - version: -

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.9.5

Trust: 0.3

vendor:freebsdmodel:release-p5scope:eqversion:9.1

Trust: 0.3

vendor:freebsdmodel:9.1-release-p14scope: - version: -

Trust: 0.3

vendor:freebsdmodel:9.1-release-p3scope: - version: -

Trust: 0.3

vendor:freebsdmodel:10.1-rc1-p1scope: - version: -

Trust: 0.3

vendor:freebsdmodel:9.2-release-p7scope: - version: -

Trust: 0.3

vendor:freebsdmodel:9.2-release-p12scope: - version: -

Trust: 0.3

vendor:freebsdmodel:9.3-beta1-p2scope: - version: -

Trust: 0.3

vendor:freebsdmodel:9.1-release-p11scope: - version: -

Trust: 0.3

vendor:freebsdmodel:8.4-rc2-p1scope: - version: -

Trust: 0.3

vendor:freebsdmodel:9.1-release-p16scope: - version: -

Trust: 0.3

vendor:freebsdmodel:9.3-rc2-p1scope: - version: -

Trust: 0.3

vendor:freebsdmodel:9.3-release-p1scope: - version: -

Trust: 0.3

vendor:freebsdmodel:9.3-rc2scope: - version: -

Trust: 0.3

vendor:freebsdmodel:9.3-rc3-p1scope: - version: -

Trust: 0.3

vendor:freebsdmodel:10.0-stablescope: - version: -

Trust: 0.3

vendor:freebsdmodel:9.2-rc1scope: - version: -

Trust: 0.3

vendor:freebsdmodel:10.0-rc1-p1scope: - version: -

Trust: 0.3

vendor:freebsdmodel:9.1-release-p19scope: - version: -

Trust: 0.3

vendor:freebsdmodel:release-p4scope:eqversion:9.1

Trust: 0.3

vendor:freebsdmodel:10.1-rc2-p3scope:neversion: -

Trust: 0.3

vendor:freebsdmodel:8.4-stablescope:neversion: -

Trust: 0.3

vendor:freebsdmodel:9.2-release-p13scope: - version: -

Trust: 0.3

vendor:freebsdmodel:10.0-release-p1scope: - version: -

Trust: 0.3

vendor:freebsdmodel:9.2-release-p3scope: - version: -

Trust: 0.3

vendor:freebsdmodel:9.1-rc2scope: - version: -

Trust: 0.3

vendor:freebsdmodel:-release-p8scope:eqversion:4.10

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.8.5

Trust: 0.3

vendor:freebsdmodel:9.3-rc1-p2scope: - version: -

Trust: 0.3

vendor:freebsdmodel:9.2-release-p10scope: - version: -

Trust: 0.3

vendor:freebsdmodel:10.1-beta1-p1scope: - version: -

Trust: 0.3

vendor:freebsdmodel:8.4-release-p7scope: - version: -

Trust: 0.3

vendor:freebsdmodel:10.0-release-p10scope: - version: -

Trust: 0.3

vendor:freebsdmodel:8.4-release-p11scope: - version: -

Trust: 0.3

vendor:freebsdmodel:9.3-release-p3scope: - version: -

Trust: 0.3

vendor:freebsdmodel:9.1-release-p10scope: - version: -

Trust: 0.3

vendor:freebsdmodel:9.2-stablescope: - version: -

Trust: 0.3

vendor:freebsdmodel:9.1-release-p18scope: - version: -

Trust: 0.3

vendor:freebsdmodel:9.2-release-p8scope: - version: -

Trust: 0.3

vendor:freebsdmodel:10.0-release-p5scope: - version: -

Trust: 0.3

vendor:freebsdmodel:9.1-release-p7scope: - version: -

Trust: 0.3

vendor:freebsdmodel:rc1scope:eqversion:9.2

Trust: 0.3

vendor:freebsdmodel:10.0-release-p7scope: - version: -

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:4.10

Trust: 0.3

vendor:freebsdmodel:9.2-release-p11scope: - version: -

Trust: 0.3

vendor:freebsdmodel:9.1-release-p17scope: - version: -

Trust: 0.3

vendor:freebsdmodel:9.1--relengscope: - version: -

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:10.1

Trust: 0.3

vendor:freebsdmodel:9.1-release-p22scope:neversion: -

Trust: 0.3

vendor:freebsdmodel:8.4-release-p16scope: - version: -

Trust: 0.3

vendor:freebsdmodel:9.3-beta3-p2scope: - version: -

Trust: 0.3

vendor:freebsdmodel:-relengscope:eqversion:4.10

Trust: 0.3

vendor:freebsdmodel:9.2-release-p9scope: - version: -

Trust: 0.3

vendor:freebsdmodel:9.3-beta1-p1scope: - version: -

Trust: 0.3

vendor:netbsdmodel:tnftpscope:eqversion:0

Trust: 0.3

vendor:freebsdmodel:9.1-relengscope: - version: -

Trust: 0.3

vendor:freebsdmodel:9.2-rc2scope: - version: -

Trust: 0.3

vendor:freebsdmodel:8.4-release-p15scope: - version: -

Trust: 0.3

vendor:freebsdmodel:8.4-beta1scope: - version: -

Trust: 0.3

vendor:freebsdmodel:8.4-rc1-p1scope: - version: -

Trust: 0.3

vendor:freebsdmodel:9.3-release-p5scope:neversion: -

Trust: 0.3

vendor:freebsdmodel:9.2-release-p15scope:neversion: -

Trust: 0.3

vendor:freebsdmodel:10.0-release-p9scope: - version: -

Trust: 0.3

vendor:freebsdmodel:9.2-rc1-p2scope: - version: -

Trust: 0.3

vendor:freebsdmodel:8.4-release-p14scope: - version: -

Trust: 0.3

vendor:freebsdmodel:9.2-release-p5scope: - version: -

Trust: 0.3

vendor:freebsdmodel:10.0-release-p4scope: - version: -

Trust: 0.3

vendor:freebsdmodel:9.1-release-p12scope: - version: -

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:8.4

Trust: 0.3

vendor:freebsdmodel:10.0-rc2-p1scope: - version: -

Trust: 0.3

vendor:freebsdmodel:8.4-prereleasescope: - version: -

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:9.1

Trust: 0.3

vendor:freebsdmodel:8.4-release-p4scope: - version: -

Trust: 0.3

vendor:freebsdmodel:10.1-beta3-p1scope: - version: -

Trust: 0.3

sources: BID: 70792 // JVNDB: JVNDB-2014-005490 // CNNVD: CNNVD-201410-1416 // NVD: CVE-2014-8517

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2014-8517
value: HIGH

Trust: 1.0

NVD: CVE-2014-8517
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201410-1416
value: HIGH

Trust: 0.6

VULHUB: VHN-76462
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2014-8517
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-76462
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-76462 // JVNDB: JVNDB-2014-005490 // CNNVD: CNNVD-201410-1416 // NVD: CVE-2014-8517

PROBLEMTYPE DATA

problemtype:CWE-77

Trust: 1.1

problemtype:CWE-Other

Trust: 0.8

sources: VULHUB: VHN-76462 // JVNDB: JVNDB-2014-005490 // NVD: CVE-2014-8517

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 139730 // CNNVD: CNNVD-201410-1416

TYPE

operating system commend injection

Trust: 0.6

sources: CNNVD: CNNVD-201410-1416

CONFIGURATIONS

sources: JVNDB: JVNDB-2014-005490

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-76462

PATCH

title:APPLE-SA-2015-01-27-4url:http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html

Trust: 0.8

title:HT204244url:http://support.apple.com/en-us/HT204244

Trust: 0.8

title:HT204244url:http://support.apple.com/ja-jp/HT204244

Trust: 0.8

title:NetBSD-SA2014-013url:http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-013.txt.asc

Trust: 0.8

title:NetBSD-5.1.5-acorn26url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=54629

Trust: 0.6

title:NetBSD-5.2.3-acorn26url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=54630

Trust: 0.6

sources: JVNDB: JVNDB-2014-005490 // CNNVD: CNNVD-201410-1416

EXTERNAL IDS

db:NVDid:CVE-2014-8517

Trust: 3.0

db:SECUNIAid:62260

Trust: 1.7

db:SECUNIAid:62028

Trust: 1.7

db:EXPLOIT-DBid:43112

Trust: 1.1

db:BIDid:70792

Trust: 1.0

db:JVNid:JVNVU96447236

Trust: 0.8

db:JVNDBid:JVNDB-2014-005490

Trust: 0.8

db:CNNVDid:CNNVD-201410-1416

Trust: 0.7

db:SECUNIAid:61491

Trust: 0.6

db:SECUNIAid:61967

Trust: 0.6

db:NSFOCUSid:28234

Trust: 0.6

db:PACKETSTORMid:128981

Trust: 0.2

db:PACKETSTORMid:139730

Trust: 0.2

db:EXPLOIT-DBid:35427

Trust: 0.1

db:PACKETSTORMid:144874

Trust: 0.1

db:VULHUBid:VHN-76462

Trust: 0.1

sources: VULHUB: VHN-76462 // BID: 70792 // JVNDB: JVNDB-2014-005490 // PACKETSTORM: 139730 // PACKETSTORM: 128981 // CNNVD: CNNVD-201410-1416 // NVD: CVE-2014-8517

REFERENCES

url:http://seclists.org/oss-sec/2014/q4/459

Trust: 2.8

url:http://seclists.org/oss-sec/2014/q4/464

Trust: 1.7

url:http://ftp.netbsd.org/pub/netbsd/security/advisories/netbsd-sa2014-013.txt.asc

Trust: 1.7

url:http://secunia.com/advisories/62028

Trust: 1.7

url:http://secunia.com/advisories/62260

Trust: 1.7

url:http://lists.opensuse.org/opensuse-updates/2014-11/msg00029.html

Trust: 1.7

url:https://security.gentoo.org/glsa/201611-05

Trust: 1.2

url:http://lists.apple.com/archives/security-announce/2015/jan/msg00003.html

Trust: 1.1

url:http://support.apple.com/ht204244

Trust: 1.1

url:https://www.exploit-db.com/exploits/43112/

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-8517

Trust: 0.8

url:http://jvn.jp/vu/jvnvu96447236/index.html

Trust: 0.8

url:https://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-8517

Trust: 0.8

url:http://secunia.com/advisories/61491

Trust: 0.6

url:http://secunia.com/advisories/61967

Trust: 0.6

url:http://www.securityfocus.com/bid/70792

Trust: 0.6

url:http://www.nsfocus.net/vulndb/28234

Trust: 0.6

url:http://seclists.org/bugtraq/2014/nov/19

Trust: 0.3

url:http://www.netbsd.org/

Trust: 0.3

url:https://bugzilla.redhat.com/show_bug.cgi?id=1158286

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2014-8517

Trust: 0.2

url:http://creativecommons.org/licenses/by-sa/2.5

Trust: 0.1

url:https://security.gentoo.org/

Trust: 0.1

url:https://bugs.gentoo.org.

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-8517

Trust: 0.1

url:http://security.freebsd.org/patches/sa-14:26/ftp.patch

Trust: 0.1

url:http://security.freebsd.org/patches/sa-14:26/ftp-8.patch.asc

Trust: 0.1

url:http://security.freebsd.org/>.

Trust: 0.1

url:http://security.freebsd.org/advisories/freebsd-sa-14:26.ftpd.asc>

Trust: 0.1

url:http://security.freebsd.org/patches/sa-14:26/ftp.patch.asc

Trust: 0.1

url:http://security.freebsd.org/patches/sa-14:26/ftp-8.patch

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-8517>

Trust: 0.1

url:http://svnweb.freebsd.org/base?view=revision&revision=nnnnnn>

Trust: 0.1

sources: VULHUB: VHN-76462 // BID: 70792 // JVNDB: JVNDB-2014-005490 // PACKETSTORM: 139730 // PACKETSTORM: 128981 // CNNVD: CNNVD-201410-1416 // NVD: CVE-2014-8517

CREDITS

Jared Mcneill

Trust: 0.6

sources: CNNVD: CNNVD-201410-1416

SOURCES

db:VULHUBid:VHN-76462
db:BIDid:70792
db:JVNDBid:JVNDB-2014-005490
db:PACKETSTORMid:139730
db:PACKETSTORMid:128981
db:CNNVDid:CNNVD-201410-1416
db:NVDid:CVE-2014-8517

LAST UPDATE DATE

2025-04-13T20:20:27.594000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-76462date:2017-11-06T00:00:00
db:BIDid:70792date:2015-04-13T21:21:00
db:JVNDBid:JVNDB-2014-005490date:2015-02-02T00:00:00
db:CNNVDid:CNNVD-201410-1416date:2014-11-18T00:00:00
db:NVDid:CVE-2014-8517date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:VULHUBid:VHN-76462date:2014-11-17T00:00:00
db:BIDid:70792date:2014-10-26T00:00:00
db:JVNDBid:JVNDB-2014-005490date:2014-11-19T00:00:00
db:PACKETSTORMid:139730date:2016-11-15T16:47:48
db:PACKETSTORMid:128981date:2014-11-05T17:15:51
db:CNNVDid:CNNVD-201410-1416date:2014-10-30T00:00:00
db:NVDid:CVE-2014-8517date:2014-11-17T16:59:05.213