CVE-2014-8517
Severity CVSS v4.0:
Pending analysis
Type:
CWE-77
Command Injection
Publication date:
17/11/2014
Last modified:
12/04/2025
Description
The fetch_url function in usr.bin/ftp/fetch.c in tnftp, as used in NetBSD 5.1 through 5.1.4, 5.2 through 5.2.2, 6.0 through 6.0.6, and 6.1 through 6.1.5 allows remote attackers to execute arbitrary commands via a | (pipe) character at the end of an HTTP redirect.
Impact
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:apple:mac_os_x:10.8.5:*:*:*:*:*:*:* | ||
| cpe:2.3:o:apple:mac_os_x:10.9.5:*:*:*:*:*:*:* | ||
| cpe:2.3:o:apple:mac_os_x:10.10.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:apple:mac_os_x:10.10.1:*:*:*:*:*:*:* | ||
| cpe:2.3:o:netbsd:netbsd:5.1:*:*:*:*:*:*:* | ||
| cpe:2.3:o:netbsd:netbsd:5.1.1:*:*:*:*:*:*:* | ||
| cpe:2.3:o:netbsd:netbsd:5.1.2:*:*:*:*:*:*:* | ||
| cpe:2.3:o:netbsd:netbsd:5.1.3:*:*:*:*:*:*:* | ||
| cpe:2.3:o:netbsd:netbsd:5.1.4:*:*:*:*:*:*:* | ||
| cpe:2.3:o:netbsd:netbsd:5.2:*:*:*:*:*:*:* | ||
| cpe:2.3:o:netbsd:netbsd:5.2.1:*:*:*:*:*:*:* | ||
| cpe:2.3:o:netbsd:netbsd:5.2.2:*:*:*:*:*:*:* | ||
| cpe:2.3:o:netbsd:netbsd:6.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:netbsd:netbsd:6.0.1:*:*:*:*:*:*:* | ||
| cpe:2.3:o:netbsd:netbsd:6.0.2:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-013.txt.asc
- http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html
- http://lists.opensuse.org/opensuse-updates/2014-11/msg00029.html
- http://seclists.org/oss-sec/2014/q4/459
- http://seclists.org/oss-sec/2014/q4/464
- http://secunia.com/advisories/62028
- http://secunia.com/advisories/62260
- http://support.apple.com/HT204244
- https://security.gentoo.org/glsa/201611-05
- https://www.exploit-db.com/exploits/43112/
- http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-013.txt.asc
- http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html
- http://lists.opensuse.org/opensuse-updates/2014-11/msg00029.html
- http://seclists.org/oss-sec/2014/q4/459
- http://seclists.org/oss-sec/2014/q4/464
- http://secunia.com/advisories/62028
- http://secunia.com/advisories/62260
- http://support.apple.com/HT204244
- https://security.gentoo.org/glsa/201611-05
- https://www.exploit-db.com/exploits/43112/



