CVE-2005-0372
CVSS5.0
发布时间 :2005-05-02 00:00:00
修订时间 :2010-08-21 00:25:56
NMCOPS    

[原文]Directory traversal vulnerability in gftp before 2.0.18 for GTK+ allows remote malicious FTP servers to read arbitrary files via .. (dot dot) sequences in filenames returned from a LIST command.


[CNNVD]gFTP远程目录遍历漏洞(CNNVD-200505-097)

        gFTP是一款基于GNOME的FTP客户端。
        gFTP对文件名缺少充分过滤,远程攻击者可以利用这个漏洞在系统上建立或覆盖任意文件。攻击者可以构建恶意FTP服务器,提交包含目录遍历字符的文件名给gFTP处理,可在系统上建立文件或者覆盖文件。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:gtk:gtk%2B:2.0.0
cpe:/a:gtk:gtk%2B:2.0.9
cpe:/a:gtk:gtk%2B:2.0.1
cpe:/a:gtk:gtk%2B:2.0.6
cpe:/a:gtk:gtk%2B:2.0.5
cpe:/a:gtk:gtk%2B:2.0.3
cpe:/a:gtk:gtk%2B:2.0.4
cpe:/a:gtk:gtk%2B:2.0.18
cpe:/a:gtk:gtk%2B:2.0.2
cpe:/a:gtk:gtk%2B:2.0.7
cpe:/a:gtk:gtk%2B:2.0.8

- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:9923Directory traversal vulnerability in gftp before 2.0.18 for GTK+ allows remote malicious FTP servers to read arbitrary files via .. (dot dot...
oval:org.mitre.oval:def:717gftp Directory Traversal Vulnerability
*OVAL详细的描述了检测该漏洞的方法,你可以从相关的OVAL定义中找到更多检测该漏洞的技术细节。

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0372
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-0372
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200505-097
(官方数据源) CNNVD

- 其它链接及资源

http://www.securityfocus.com/bid/12539
(PATCH)  BID  12539
http://www.gentoo.org/security/en/glsa/glsa-200502-27.xml
(VENDOR_ADVISORY)  GENTOO  GLSA-200502-27
http://www.debian.org/security/2005/dsa-686
(VENDOR_ADVISORY)  DEBIAN  DSA-686
http://www.securityfocus.com/advisories/8380
(UNKNOWN)  FEDORA  FEDORA-2005-310
http://www.securityfocus.com/advisories/8379
(UNKNOWN)  FEDORA  FEDORA-2005-309
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000957
(UNKNOWN)  CONECTIVA  CLSA-2005:957
http://www.redhat.com/support/errata/RHSA-2005-410.html
(UNKNOWN)  REDHAT  RHSA-2005:410
http://www.mandriva.com/security/advisories?name=MDKSA-2005:050
(UNKNOWN)  MANDRAKE  MDKSA-2005:050

- 漏洞信息

gFTP远程目录遍历漏洞
中危 路径遍历
2005-05-02 00:00:00 2005-10-20 00:00:00
远程  
        gFTP是一款基于GNOME的FTP客户端。
        gFTP对文件名缺少充分过滤,远程攻击者可以利用这个漏洞在系统上建立或覆盖任意文件。攻击者可以构建恶意FTP服务器,提交包含目录遍历字符的文件名给gFTP处理,可在系统上建立文件或者覆盖文件。

- 公告与补丁

        目前厂商已经发布了升级补丁以修复此安全问题,补丁获取链接:
        http://security.gentoo.org/glsa/glsa-200502-27.xml
        http://security.gentoo.org/glsa/glsa-200502-27.xml

- 漏洞信息 (F36210)

dsa-686.txt (PacketStormID:F36210)
2005-02-25 00:00:00
 
advisory,arbitrary
linux,debian
CVE-2004-1376,CVE-2005-0372
[点击下载]

Debian Security Advisory 686-1 - Albert Puigsech Galicia discovered a directory traversal vulnerability in a proprietary FTP client which is also present in gftp, a GTK+ FTP client. A malicious server could provide a specially crafted filename that could cause arbitrary files to be overwritten or created by the client.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
Debian Security Advisory DSA 686-1                     security@debian.org
http://www.debian.org/security/                             Martin Schulze
February 17th, 2005                     http://www.debian.org/security/faq
- --------------------------------------------------------------------------

Package        : gftp
Vulnerability  : missing input sanitising
Problem-Type   : remote
Debian-specific: no
CVE ID         : CAN-2005-0372

Albert Puigsech Galicia discovered a directory traversal vulnerability
in a proprietary FTP client (CAN-2004-1376) which is also present in
gftp, a GTK+ FTP client.  A malicious server could provide a specially
crafted filename that could cause arbitrary files to be overwritten or
created by the client.

For the stable distribution (woody) this problem has been fixed in
version 2.0.11-1woody1.

For the unstable distribution (sid) this problem has been fixed in
version 2.0.18-1.

We recommend that you upgrade your gftp package.


Upgrade Instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.0 alias woody
- --------------------------------

  Source archives:

    http://security.debian.org/pool/updates/main/g/gftp/gftp_2.0.11-1woody1.dsc
      Size/MD5 checksum:      631 980555d208281b3ac35069dd0119f98c
    http://security.debian.org/pool/updates/main/g/gftp/gftp_2.0.11-1woody1.diff.gz
      Size/MD5 checksum:     2760 15eff6342db5e2f2bee5c262618cf642
    http://security.debian.org/pool/updates/main/g/gftp/gftp_2.0.11.orig.tar.gz
      Size/MD5 checksum:   896320 3c63b5eed2faffe820bace112be2db8a

  Alpha architecture:

    http://security.debian.org/pool/updates/main/g/gftp/gftp_2.0.11-1woody1_alpha.deb
      Size/MD5 checksum:    27350 39764c5e34ef08fce49bf59f887a0afa
    http://security.debian.org/pool/updates/main/g/gftp/gftp-common_2.0.11-1woody1_alpha.deb
      Size/MD5 checksum:   234078 359126a5f2d1da940f1b6000c7ab9752
    http://security.debian.org/pool/updates/main/g/gftp/gftp-gtk_2.0.11-1woody1_alpha.deb
      Size/MD5 checksum:   252376 56405294ce7a01e84976c8fc6683f544
    http://security.debian.org/pool/updates/main/g/gftp/gftp-text_2.0.11-1woody1_alpha.deb
      Size/MD5 checksum:    86296 8ac8f60d39cf4c3db57dd04df0b11a53

  ARM architecture:

    http://security.debian.org/pool/updates/main/g/gftp/gftp_2.0.11-1woody1_arm.deb
      Size/MD5 checksum:    27360 9fea83142508e1b6c2790016c3395ca0
    http://security.debian.org/pool/updates/main/g/gftp/gftp-common_2.0.11-1woody1_arm.deb
      Size/MD5 checksum:   234120 a4760d5de60e0a4a04be1c8dc75ec264
    http://security.debian.org/pool/updates/main/g/gftp/gftp-gtk_2.0.11-1woody1_arm.deb
      Size/MD5 checksum:   226588 71fb1b6d6603d5967c6714e7ca33f389
    http://security.debian.org/pool/updates/main/g/gftp/gftp-text_2.0.11-1woody1_arm.deb
      Size/MD5 checksum:    73906 60c748df56cbef3944079654553497ea

  Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/g/gftp/gftp_2.0.11-1woody1_i386.deb
      Size/MD5 checksum:    27312 10aec83a3257a3bc22739e6087bc6ef2
    http://security.debian.org/pool/updates/main/g/gftp/gftp-common_2.0.11-1woody1_i386.deb
      Size/MD5 checksum:   234056 57459c25bd9f96bd6f26e566468856ba
    http://security.debian.org/pool/updates/main/g/gftp/gftp-gtk_2.0.11-1woody1_i386.deb
      Size/MD5 checksum:   219792 98beb285ca804a8fbbed4498a54268ff
    http://security.debian.org/pool/updates/main/g/gftp/gftp-text_2.0.11-1woody1_i386.deb
      Size/MD5 checksum:    68360 f8fa329a81404c4d5392c285e50a5505

  Intel IA-64 architecture:

    http://security.debian.org/pool/updates/main/g/gftp/gftp_2.0.11-1woody1_ia64.deb
      Size/MD5 checksum:    27348 6f32e2cb005ffe56e2803b860e0e4d74
    http://security.debian.org/pool/updates/main/g/gftp/gftp-common_2.0.11-1woody1_ia64.deb
      Size/MD5 checksum:   234044 a2c3ff641d7b2e880456f1a8868b33fe
    http://security.debian.org/pool/updates/main/g/gftp/gftp-gtk_2.0.11-1woody1_ia64.deb
      Size/MD5 checksum:   299582 b7c2e1ea7228f461235666d932361551
    http://security.debian.org/pool/updates/main/g/gftp/gftp-text_2.0.11-1woody1_ia64.deb
      Size/MD5 checksum:   110640 26995f700b8389fd9aad5b368f5faf7c

  HP Precision architecture:

    http://security.debian.org/pool/updates/main/g/gftp/gftp_2.0.11-1woody1_hppa.deb
      Size/MD5 checksum:    27358 07b2d426543fd686ad3380e8bcd4805f
    http://security.debian.org/pool/updates/main/g/gftp/gftp-common_2.0.11-1woody1_hppa.deb
      Size/MD5 checksum:   234094 322189d295ba47c91d2061309fa6a9fa
    http://security.debian.org/pool/updates/main/g/gftp/gftp-gtk_2.0.11-1woody1_hppa.deb
      Size/MD5 checksum:   242482 44bb85b863ae217f2575835877041d4a
    http://security.debian.org/pool/updates/main/g/gftp/gftp-text_2.0.11-1woody1_hppa.deb
      Size/MD5 checksum:    82608 e31d810b73f571088cc837958d7a2796

  Motorola 680x0 architecture:

    http://security.debian.org/pool/updates/main/g/gftp/gftp_2.0.11-1woody1_m68k.deb
      Size/MD5 checksum:    27358 faf8af474984da98e9d6f98f0918a261
    http://security.debian.org/pool/updates/main/g/gftp/gftp-common_2.0.11-1woody1_m68k.deb
      Size/MD5 checksum:   234106 a8b2e05b710887903feed817016f5f97
    http://security.debian.org/pool/updates/main/g/gftp/gftp-gtk_2.0.11-1woody1_m68k.deb
      Size/MD5 checksum:   210554 7a532d25cb6840e69f97647b08d619c0
    http://security.debian.org/pool/updates/main/g/gftp/gftp-text_2.0.11-1woody1_m68k.deb
      Size/MD5 checksum:    64032 983b93b4e2aac1922e97a193220e18d4

  Big endian MIPS architecture:

    http://security.debian.org/pool/updates/main/g/gftp/gftp_2.0.11-1woody1_mips.deb
      Size/MD5 checksum:    27362 103f10d9ae47826ee1957d14d556a46f
    http://security.debian.org/pool/updates/main/g/gftp/gftp-common_2.0.11-1woody1_mips.deb
      Size/MD5 checksum:   234114 0667ca7e24f987e6002955093df95537
    http://security.debian.org/pool/updates/main/g/gftp/gftp-gtk_2.0.11-1woody1_mips.deb
      Size/MD5 checksum:   224722 0bdb6399f56a1cc4819c3ab883a53a68
    http://security.debian.org/pool/updates/main/g/gftp/gftp-text_2.0.11-1woody1_mips.deb
      Size/MD5 checksum:    77184 26288b5af19513a0cf09bd82ca7b9336

  Little endian MIPS architecture:

    http://security.debian.org/pool/updates/main/g/gftp/gftp_2.0.11-1woody1_mipsel.deb
      Size/MD5 checksum:    27372 43c94486400ca12254c554cb4650fe01
    http://security.debian.org/pool/updates/main/g/gftp/gftp-common_2.0.11-1woody1_mipsel.deb
      Size/MD5 checksum:   234188 94df73bb1fe62d21a665ee80380db772
    http://security.debian.org/pool/updates/main/g/gftp/gftp-gtk_2.0.11-1woody1_mipsel.deb
      Size/MD5 checksum:   224648 210416ce87866bab58f2b2c390f52ece
    http://security.debian.org/pool/updates/main/g/gftp/gftp-text_2.0.11-1woody1_mipsel.deb
      Size/MD5 checksum:    77994 e1803d086deb47d61f2f79b62e22913e

  PowerPC architecture:

    http://security.debian.org/pool/updates/main/g/gftp/gftp_2.0.11-1woody1_powerpc.deb
      Size/MD5 checksum:    27356 6426c00ec3364f72f0ec9481e5e89bb5
    http://security.debian.org/pool/updates/main/g/gftp/gftp-common_2.0.11-1woody1_powerpc.deb
      Size/MD5 checksum:   234082 35a1396d45c42ee5b34045c23ae34b05
    http://security.debian.org/pool/updates/main/g/gftp/gftp-gtk_2.0.11-1woody1_powerpc.deb
      Size/MD5 checksum:   227890 8fb52949c02dc3c8a8bf39c86814da9b
    http://security.debian.org/pool/updates/main/g/gftp/gftp-text_2.0.11-1woody1_powerpc.deb
      Size/MD5 checksum:    73356 8eba2f163e75f0716879c0320442c246

  IBM S/390 architecture:

    http://security.debian.org/pool/updates/main/g/gftp/gftp_2.0.11-1woody1_s390.deb
      Size/MD5 checksum:    27352 6e71f2937c2db84ed950583237308504
    http://security.debian.org/pool/updates/main/g/gftp/gftp-common_2.0.11-1woody1_s390.deb
      Size/MD5 checksum:   234104 85637cf1e6794969be0cc35b6478f95b
    http://security.debian.org/pool/updates/main/g/gftp/gftp-gtk_2.0.11-1woody1_s390.deb
      Size/MD5 checksum:   219246 1f4647d19f593d958c5653e1a6515c2d
    http://security.debian.org/pool/updates/main/g/gftp/gftp-text_2.0.11-1woody1_s390.deb
      Size/MD5 checksum:    68090 f0a4483365820c67a7d875b21bc81734

  Sun Sparc architecture:

    http://security.debian.org/pool/updates/main/g/gftp/gftp_2.0.11-1woody1_sparc.deb
      Size/MD5 checksum:    27356 f734ad981e036daed46044b6bd12f236
    http://security.debian.org/pool/updates/main/g/gftp/gftp-common_2.0.11-1woody1_sparc.deb
      Size/MD5 checksum:   234102 4d9c016c8daefd7b20aefa37a193a6ce
    http://security.debian.org/pool/updates/main/g/gftp/gftp-gtk_2.0.11-1woody1_sparc.deb
      Size/MD5 checksum:   226774 e04c114438c2788155e43c6c32eb4683
    http://security.debian.org/pool/updates/main/g/gftp/gftp-text_2.0.11-1woody1_sparc.deb
      Size/MD5 checksum:    74910 88a25c71729495ccbebaf4c98eee102d


  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.0 (GNU/Linux)

iD8DBQFCFL8EW5ql+IAeqTIRAh86AJsG09wTgBE2liWU749noFHntWaHTACfeFfr
bpWjExuQyO+zj3bqzOnvl2E=
=Lbsq
-----END PGP SIGNATURE-----

    

- 漏洞信息

13669
gFTP Returned File Path Traversal Arbitrary File Manipulation
Input Manipulation
Vendor Verified

- 漏洞描述

Unknown or Incomplete

- 时间线

2005-02-10 Unknow
Unknow Unknow

- 解决方案

Upgrade to version 2.0.18 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

gFTP Remote Directory Traversal Vulnerability
Input Validation Error 12539
Yes No
2005-02-14 12:00:00 2009-07-12 10:06:00
The individual or individuals responsible for the discovery of this issue are currently unknown; the vendor disclosed this issue.

- 受影响的程序版本

SGI ProPack 3.0
SGI Advanced Linux Environment 3.0
S.u.S.E. Novell Linux Desktop 9.0
S.u.S.E. Linux Personal 9.2 x86_64
S.u.S.E. Linux Personal 9.2
S.u.S.E. Linux Personal 9.1 x86_64
S.u.S.E. Linux Personal 9.1
RedHat Linux 9.0 i386
RedHat Linux 7.3 i686
RedHat Linux 7.3 i386
RedHat Linux 7.3
RedHat Enterprise Linux WS 4
RedHat Enterprise Linux WS 3
RedHat Enterprise Linux WS 2.1 IA64
RedHat Enterprise Linux WS 2.1
RedHat Enterprise Linux ES 4
RedHat Enterprise Linux ES 3
RedHat Enterprise Linux ES 2.1 IA64
RedHat Enterprise Linux ES 2.1
RedHat Enterprise Linux Desktop version 4
RedHat Desktop 4.0
RedHat Desktop 3.0
RedHat Advanced Workstation for the Itanium Processor 2.1 IA64
RedHat Advanced Workstation for the Itanium Processor 2.1
Red Hat Fedora Core3
Red Hat Fedora Core2
Red Hat Fedora Core1
Red Hat Enterprise Linux AS 4
Red Hat Enterprise Linux AS 3
Red Hat Enterprise Linux AS 2.1 IA64
Red Hat Enterprise Linux AS 2.1
Mandriva Linux Mandrake 10.1 x86_64
Mandriva Linux Mandrake 10.1
Mandriva Linux Mandrake 10.0 AMD64
Mandriva Linux Mandrake 10.0
MandrakeSoft Corporate Server 3.0 x86_64
MandrakeSoft Corporate Server 3.0
gFTP gFTP 2.0.17
+ S.u.S.E. Linux Personal 9.2 x86_64
+ S.u.S.E. Linux Personal 9.2
gFTP gFTP 2.0.16
+ S.u.S.E. Linux Personal 9.1 x86_64
+ S.u.S.E. Linux Personal 9.1
gFTP gFTP 2.0.15
+ S.u.S.E. Linux Personal 9.0 x86_64
+ S.u.S.E. Linux Personal 9.0
gFTP gFTP 2.0.15
+ S.u.S.E. Linux Personal 9.0 x86_64
+ S.u.S.E. Linux Personal 9.0
gFTP gFTP 2.0.14
+ S.u.S.E. Linux Personal 8.2
gFTP gFTP 2.0.13
+ S.u.S.E. Linux 8.1
gFTP gFTP 2.0.12
gFTP gFTP 2.0.11
+ Debian Linux 3.0 sparc
+ Debian Linux 3.0 s/390
+ Debian Linux 3.0 ppc
+ Debian Linux 3.0 mipsel
+ Debian Linux 3.0 mips
+ Debian Linux 3.0 m68k
+ Debian Linux 3.0 ia-64
+ Debian Linux 3.0 ia-32
+ Debian Linux 3.0 hppa
+ Debian Linux 3.0 arm
+ Debian Linux 3.0 alpha
+ Debian Linux 3.0
gFTP gFTP 2.0.10
gFTP gFTP 2.0.9
gFTP gFTP 2.0.8
- Red Hat Linux 6.2
- RedHat Linux 7.1
- RedHat Linux 7.0
gFTP gFTP 2.0.7
- Red Hat Linux 6.2
- RedHat Linux 7.1
- RedHat Linux 7.0
gFTP gFTP 2.0.6 a
+ Debian Linux 2.2 sparc
+ Debian Linux 2.2 powerpc
+ Debian Linux 2.2 arm
+ Debian Linux 2.2 alpha
+ Debian Linux 2.2 68k
+ Debian Linux 2.2
gFTP gFTP 2.0.6
gFTP gFTP 2.0.5
gFTP gFTP 2.0.4
gFTP gFTP 2.0.3
gFTP gFTP 2.0.2
gFTP gFTP 2.0.1
gFTP gFTP 2.0
gFTP gFTP 1.13
gFTP gFTP 1.12
gFTP gFTP 1.11
gFTP gFTP 1.1
gFTP gFTP 1.0
gFTP gFTP 0.21
gFTP gFTP 0.2
gFTP gFTP 0.1
Gentoo Linux
Conectiva Linux 10.0
Conectiva Linux 9.0
gFTP gFTP 2.0.18

- 不受影响的程序版本

gFTP gFTP 2.0.18

- 漏洞讨论

A remote directory traversal vulnerability reportedly affects gFTP. This issue is due to a failure of the application to sanitize input supplied by malicious FTP server.

An attacker may leverage this issue to overwrite or create arbitrary files on an affected computer with the privileges of an unsuspecting user running the vulnerable application. This may lead to a compromise of the affected computer, denial of service attacks, as well as others.

- 漏洞利用

No exploit is required to leverage this issue.

- 解决方案

The vendor has released an upgrade that resolves this issue.

Conectiva has released an advisory (CLSA-2005:957) and fixes to address this issue. Please see the referenced advisory for further information regarding obtaining and applying appropriate updates.

Mandrake has released advisory MDKSA-2005:050 dealing with this issue. Please see the referenced advisory for more information.

SuSE Linux has released a security summary report (SUSE-SR:2005:005) that contains information regarding the availability of fixes to address this and other vulnerabilities. Customers are advised to peruse the referenced advisory for further information regarding obtaining and applying appropriate updates.

Debian has released advisory DSA 686-1 to address this issue. Please see the referenced advisory for more information.

Gentoo has released advisory GLSA 200502-27 to address this issue. Please see the referenced advisory for more information. Gentoo users may carry out the following commands to update their computers:

emerge --sync
emerge --ask --oneshot --verbose ">=net-ftp/gftp-2.0.18-r1"

Fedora advisories FEDORA-2005-309 and FEDORA-2005-310 for Fedora Core 2 and Core 3 are available to address this issue. Please see the referenced advisories for more information.

RedHat has released advisory RHSA-2005:410-07 to address this issue in RedHat Enterprise Linux, and Desktop Linux. Please see the referenced advisory for further information.

SGI has released advisory 20050603-01-U to address this, and other issues for SGI Advanced Linux Environment 3, and SGI ProPack 3 Service Pack 5. Please see the referenced advisory for further information.

RedHat Fedora has released Fedora Legacy security advisory FLSA:152908 addressing this issue. Please see the referenced advisory for further information.


gFTP gFTP 0.1

gFTP gFTP 0.2

gFTP gFTP 0.21

gFTP gFTP 1.0

gFTP gFTP 1.1

gFTP gFTP 1.11

gFTP gFTP 1.12

gFTP gFTP 1.13

gFTP gFTP 2.0

gFTP gFTP 2.0.1

gFTP gFTP 2.0.10

gFTP gFTP 2.0.11

gFTP gFTP 2.0.12

gFTP gFTP 2.0.13

gFTP gFTP 2.0.14

gFTP gFTP 2.0.15

gFTP gFTP 2.0.15

gFTP gFTP 2.0.16

gFTP gFTP 2.0.17

gFTP gFTP 2.0.2

gFTP gFTP 2.0.3

gFTP gFTP 2.0.4

gFTP gFTP 2.0.5

gFTP gFTP 2.0.6

gFTP gFTP 2.0.6 a

gFTP gFTP 2.0.7

gFTP gFTP 2.0.8

gFTP gFTP 2.0.9

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站