Vulnerability Description
The glob implementation in tnftpd (formerly lukemftpd), as used in Apple OS X before 10.11, allows remote attackers to cause a denial of service (memory consumption and daemon outage) via a STAT command containing a crafted pattern, as demonstrated by multiple instances of the {..,..,..}/* substring.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Netbsd | Tnftpd | All versions |
| Apple | Mac Os X | 10.10.5 |
Related Weaknesses (CWE)
References
- http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.htmlVendor Advisory
- http://www.securityfocus.com/bid/76908
- http://www.securitytracker.com/id/1033703
- https://cxsecurity.com/issue/WLB-2013040082
- https://support.apple.com/HT205267Vendor Advisory
- https://www.youtube.com/watch?v=MBK4QYkUm10Exploit
- http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.htmlVendor Advisory
- http://www.securityfocus.com/bid/76908
- http://www.securitytracker.com/id/1033703
- https://cxsecurity.com/issue/WLB-2013040082
- https://support.apple.com/HT205267Vendor Advisory
- https://www.youtube.com/watch?v=MBK4QYkUm10Exploit
FAQ
What is CVE-2015-5917?
CVE-2015-5917 is a vulnerability with a CVSS score of 5.0 (MEDIUM). The glob implementation in tnftpd (formerly lukemftpd), as used in Apple OS X before 10.11, allows remote attackers to cause a denial of service (memory consumption and daemon outage) via a STAT comma...
How severe is CVE-2015-5917?
CVE-2015-5917 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-5917?
Check the references section above for vendor advisories and patch information. Affected products include: Netbsd Tnftpd, Apple Mac Os X.