First published: Mon Aug 12 2002(Updated: )
Buffer overflow in lukemftp FTP client in SuSE 6.4 through 8.0, and possibly other operating systems, allows a malicious FTP server to execute arbitrary code via a long PASV command.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Luke Mewburn lukemftp | <=1.5 | |
SUSE Linux | =6.4 | |
SUSE Linux | =7.0 | |
SUSE Linux | =7.1 | |
SUSE Linux | =7.2 | |
SUSE Linux | =7.3 | |
SUSE Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-0768 is considered a critical vulnerability due to its potential to allow arbitrary code execution through a buffer overflow.
To fix CVE-2002-0768, upgrade to a version of lukemftp that is later than 1.5 which addresses this vulnerability.
CVE-2002-0768 affects SUSE Linux versions 6.4 through 8.0.
CVE-2002-0768 is associated with remote code execution attacks via a malicious FTP server sending a long PASV command.
Disabling the use of the lukemftp FTP client or restricting network access to trusted servers can serve as temporary workarounds for CVE-2002-0768.