Debian DSA-1739-1 : mldonkey - path traversal

medium Nessus Plugin ID 35991

Synopsis

The remote Debian host is missing a security-related update.

Description

It has been discovered that mldonkey, a client for several P2P networks, allows attackers to download arbitrary files using crafted requests to the HTTP console.

Solution

Upgrade the mldonkey packages.

The old stable distribution (etch) is not affected by this problem.

For the stable distribution (lenny), this problem has been fixed in version 2.9.5-2+lenny1.

See Also

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=516829

https://www.debian.org/security/2009/dsa-1739

Plugin Details

Severity: Medium

ID: 35991

File Name: debian_DSA-1739.nasl

Version: 1.11

Type: local

Agent: unix

Published: 3/24/2009

Updated: 1/4/2021

Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.2

CVSS v2

Risk Factor: Medium

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:mldonkey, cpe:/o:debian:debian_linux:5.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Patch Publication Date: 3/13/2009

Reference Information

CVE: CVE-2009-0753

CWE: 22

DSA: 1739