Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2007-5201

Опубликовано: 04 окт. 2007
Источник: debian

Описание

The FTP backend for Duplicity before 0.4.9 sends the password as a command line argument when calling ncftp, which might allow local users to read the password by listing the process and its arguments.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
duplicityfixed0.4.3-2package
duplicitynot-affectedetchpackage
duplicitynot-affectedsargepackage

Примечания

  • ftp is an inherently insecure protocol, any security-sensitive data would

  • be transferred through the scp, sftp or rsync backends.

  • http://lists.debian.org/debian-release/2008/01/msg00190.html

Связанные уязвимости

ubuntu
больше 18 лет назад

The FTP backend for Duplicity before 0.4.9 sends the password as a command line argument when calling ncftp, which might allow local users to read the password by listing the process and its arguments.

nvd
больше 18 лет назад

The FTP backend for Duplicity before 0.4.9 sends the password as a command line argument when calling ncftp, which might allow local users to read the password by listing the process and its arguments.

github
почти 4 года назад

FTP backend for Duplicity Discloses Passwords to Process Listing