DEBIAN-CVE-2003-0963

Source
https://security-tracker.debian.org/tracker/CVE-2003-0963
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2003-0963.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2003-0963
Upstream
Published
2004-01-05T05:00:00Z
Modified
2025-11-14T03:01:17.267224Z
Summary
[none]
Details

Buffer overflows in (1) trynetscapeproxy and (2) trysquideplf for lftp 2.6.9 and earlier allow remote HTTP servers to execute arbitrary code via long directory names that are processed by the ls or rels commands.

References

Affected packages

Debian:11 / lftp

Package

Name
lftp
Purl
pkg:deb/debian/lftp?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.6.10-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / lftp

Package

Name
lftp
Purl
pkg:deb/debian/lftp?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.6.10-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / lftp

Package

Name
lftp
Purl
pkg:deb/debian/lftp?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.6.10-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / lftp

Package

Name
lftp
Purl
pkg:deb/debian/lftp?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.6.10-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}