vulnerability

FreeBSD: VID-7488378d-6007-11e6-a6c3-14dae9d210b8 (CVE-2014-8517): FreeBSD -- Remote command execution in ftp(1)

Severity
7
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
Published
Aug 11, 2016
Added
Dec 10, 2025
Modified
Dec 10, 2025

Description

Problem Description: A malicious HTTP server could cause ftp(1) to execute arbitrary commands. Impact: When operating on HTTP URIs, the ftp(1) client follows HTTP redirects, and uses the part of the path after the last '/' from the last resource it accesses as the output filename if '-o' is not specified. If the output file name provided by the server begins with a pipe ('|'), the output is passed to popen(3), which might be used to execute arbitrary commands on the ftp(1) client machine.

Solutions

freebsd-upgrade-base-10_0-release-p12freebsd-upgrade-base-9_3-release-p5freebsd-upgrade-base-9_2-release-p15freebsd-upgrade-base-9_1-release-p22freebsd-upgrade-base-8_4-release-p19
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.