SynopsisThe remote Fedora Core host is missing a security update.
DescriptionUlf Harnhammar found a remotely-triggerable buffer overflow in lftp.
An attacker could create a carefully crafted directory on a website such that, if a user connects to that directory using the lftp client and subsequently issues a 'ls' or 'rels' command, the attacker could execute arbitrary code on the users machine. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2003-0963 to this issue.
Users of lftp are advised to upgrade to these erratum packages, which upgrade lftp to a version which is not vulnerable to this issue.
Red Hat would like to thank Ulf Harnhammar for discovering and alerting us to this issue.
This update notification is being re-issued to correct the advisory ID and issue date. The update packages themselves are unchanged.
Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
SolutionUpdate the affected lftp and / or lftp-debuginfo packages.