*** This bug is a security vulnerability ***

You have been subscribed to a public security bug by Jamie Strandboge 
(jdstrand):

Binary package hint: filezilla

FileZilla 3.1.0.1 fixes a vulnerability regarding the way some errors
are handled on SSL/TLS secured data transfers.

If the data connection of a transfer gets closed, FileZilla did not check if 
the server performed an orderly TLS shutdown.
Impact

An attacker could send spoofed FIN packets to the client. Even though
GnuTLS detects this with GNUTLS_E_UNEXPECTED_PACKET_LENGTH, FileZilla
did not record a transfer failure in all cases.

Unfortunately not all servers perform an orderly SSL/TLS shutdown. Since this 
cannot be distinguished from an attack, FileZilla will not be able to download 
listings or files from such servers.
Affected versions

All versions prior to 3.1.0.1 are affected. This vulnerability has been
fixed in 3.1.0.1

** Affects: filezilla (Ubuntu)
     Importance: Undecided
         Status: New

-- 
Please update filezilla to 3.1.0.1
https://bugs.launchpad.net/bugs/251950
You received this bug notification because you are a member of Ubuntu Bugs, 
which is a direct subscriber.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to