MGASA-2024-0034

Source
https://advisories.mageia.org/MGASA-2024-0034.html
Import Source
https://advisories.mageia.org/MGASA-2024-0034.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2024-0034
Related
Published
2024-02-10T01:03:35Z
Modified
2024-02-10T18:47:37Z
Summary
Updated filezilla packages fix a security vulnerability ("Terrapin attack")
Details

Fabian Baeumer, Marcus Brinkmann and Joerg Schwenk discovered that the SSH protocol used in FileZilla is prone to a prefix truncation attack, known as the "Terrapin attack". A remote attacker could use this issue to downgrade or disable some security features and obtain sensitive information. This update fixes the issue.

References
Credits

Affected packages

Mageia:9 / filezilla

Package

Name
filezilla
Purl
pkg:rpm/mageia/filezilla?distro=mageia-9

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.66.4-1.mga9

Ecosystem specific

{
    "section": "core"
}

Mageia:9 / libfilezilla

Package

Name
libfilezilla
Purl
pkg:rpm/mageia/libfilezilla?distro=mageia-9

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.45.0-1.mga9

Ecosystem specific

{
    "section": "core"
}