FileZilla GnuTLS Multiple Vulnerabilities
RISK: Medium Risk
Multiple vulnerabilities have been identified in FileZilla, which could be exploited by remote attackers to cause a denial of service or compromise an affected system.
1. Due to a NULL pointer dereference error when processing TLS packets containing multiple "Client Hello" messages, which could be exploited by unauthenticated attackers to crash a vulnerable application.
2. Due to a buffer overflow error when processing certain "Client Hello" messages containing a Server name extension, which could be exploited by unauthenticated attackers to crash an affected application or execute arbitrary code.
3. Due to an error in the "_gnutls_ciphertext2compressed()" [lib/gnutls_cipher.c] function when handling encrypted TLS data containig invalid Record lengths, which could be exploited by unauthenticated remote attackers to crash a vulnerable application.
Impact
- Denial of Service
- Remote Code Execution
System / Technologies affected
- FileZilla versions prior to 3.0.10
Solutions
Before installation of the software, please visit the software manufacturer web-site for more details.
- Upgrade to FileZilla version 3.0.10 :
http://sourceforge.net/projects/filezilla/
Vulnerability Identifier
Source
Related Link
Share with