#VU41100 Command Injection in macOS and NetBSD - CVE-2014-8517
Published: November 17, 2014 / Updated: August 9, 2020
Vulnerability identifier: #VU41100
Vulnerability risk: Medium
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:A/U:Green
CVE-ID: CVE-2014-8517
CWE-ID: CWE-77
Exploitation vector: Remote access
Exploit availability:
Public exploit is available
Vulnerable software:
macOS
NetBSD
macOS
NetBSD
Software vendor:
Apple Inc.
NetBSD Foundation, Inc
Apple Inc.
NetBSD Foundation, Inc
Description
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
The fetch_url function in usr.bin/ftp/fetch.c in tnftp, as used in NetBSD 5.1 through 5.1.4, 5.2 through 5.2.2, 6.0 through 6.0.6, and 6.1 through 6.1.5 allows remote attackers to execute arbitrary commands via a | (pipe) character at the end of an HTTP redirect.
Remediation
Install update from vendor's website.
External links
- http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-013.txt.asc
- http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html
- http://lists.opensuse.org/opensuse-updates/2014-11/msg00029.html
- http://seclists.org/oss-sec/2014/q4/459
- http://seclists.org/oss-sec/2014/q4/464
- http://secunia.com/advisories/62028
- http://secunia.com/advisories/62260
- http://support.apple.com/HT204244
- https://security.gentoo.org/glsa/201611-05
- https://www.exploit-db.com/exploits/43112/