First published: Wed Aug 01 2018(Updated: )
It has been discovered that lftp up to and including version 4.8.3 does not properly sanitize remote file names, leading to a loss of integrity on the local system when reverse mirroring is used. A remote attacker may trick a user to use reverse mirroring on an attacker controlled FTP server, resulting in the removal of all files in the current working directory of the victim's system.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
ubuntu/lftp | <4.8.1-1ubuntu0.1 | 4.8.1-1ubuntu0.1 |
ubuntu/lftp | <4.4.13-1ubuntu0.1 | 4.4.13-1ubuntu0.1 |
ubuntu/lftp | <4.8.4-1 | 4.8.4-1 |
ubuntu/lftp | <4.6.3 | 4.6.3 |
debian/lftp | 4.8.4-2 4.9.2-2 4.9.2-3 | |
lftp | <=4.8.3 | |
Ubuntu | =12.04 | |
SUSE Linux | =42.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-10916 is often classified as medium to high due to the potential for local system integrity loss.
To fix CVE-2018-10916, upgrade lftp to version 4.8.4 or later.
Versions of lftp up to and including 4.8.3 are affected by CVE-2018-10916.
Yes, CVE-2018-10916 can be exploited by a remote attacker using a malicious FTP server.
The impact of CVE-2018-10916 is a potential loss of integrity on the local system when using reverse mirroring.