Common Vulnerabilities and Exposures assigned an identifier CVE-2009-0753 to
the following vulnerability:
Reference: MLIST:[oss-security] 20090223 CVE request: mldonkey arbitrary file download vulnerability
Reference: URL: http://www.openwall.com/lists/oss-security/2009/02/23/1
Reference: CONFIRM: http://savannah.nongnu.org/bugs/?25667
Reference: URL: http://secunia.com/advisories/34008
Absolute path traversal vulnerability in MLDonkey 2.8.4 through 2.9.7
allows remote attackers to read arbitrary files via a leading "//"
(double slash) in the filename.
Created mldonkey tracking bugs for this issue
CVE-2009-0753 Affects: F10 [bug #488305]
CVE-2009-0753 Affects: F9 [bug #488306]
This is corrected in the 3.0 release.
I'm suspecting that this CVE is already fixed by Richard W.M. Jones.
*** This bug has been marked as a duplicate of bug 487132 ***
Yes, you're right. When I went looking I didn't find the other issue. Thanks, and sorry for the noise.
Created attachment 335174 [details]
patch from Debian to fully correct the issue
Actually, it just came to my attention that this is more than just an absolute path traversal issue, and that using "../" works as well, which the patch noted in bug #487132 fails to address.
I'm going to attach the patch that Debian is planning to use, although updating to 3.0 will also correct the issue.
Ok, I'm updating to 3.0.0
mldonkey-3.0.0-1.fc9 has been submitted as an update for Fedora 9.
mldonkey-3.0.0-1.fc10 has been submitted as an update for Fedora 10.
Thank you for taking care of this, Peter.
mldonkey-3.0.0-1.fc9 has been pushed to the Fedora 9 stable repository. If problems still persist, please make note of it in this bug report.
mldonkey-3.0.0-1.fc10 has been pushed to the Fedora 10 stable repository. If problems still persist, please make note of it in this bug report.