Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2007-5201

Опубликовано: 04 окт. 2007
Источник: debian
EPSS Низкий

Описание

The FTP backend for Duplicity before 0.4.9 sends the password as a command line argument when calling ncftp, which might allow local users to read the password by listing the process and its arguments.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
duplicityfixed0.4.3-2package
duplicitynot-affectedetchpackage
duplicitynot-affectedsargepackage

Примечания

  • ftp is an inherently insecure protocol, any security-sensitive data would

  • be transferred through the scp, sftp or rsync backends.

  • http://lists.debian.org/debian-release/2008/01/msg00190.html

EPSS

Процентиль: 28%
0.00098
Низкий

Связанные уязвимости

ubuntu
около 18 лет назад

The FTP backend for Duplicity before 0.4.9 sends the password as a command line argument when calling ncftp, which might allow local users to read the password by listing the process and its arguments.

nvd
около 18 лет назад

The FTP backend for Duplicity before 0.4.9 sends the password as a command line argument when calling ncftp, which might allow local users to read the password by listing the process and its arguments.

github
больше 3 лет назад

FTP backend for Duplicity Discloses Passwords to Process Listing

EPSS

Процентиль: 28%
0.00098
Низкий