gFTP: Directory traversal vulnerability — GLSA 200502-27 gFTP is vulnerable to directory traversal attacks, possibly leading to the creation or overwriting of arbitrary files. Affected packages Package net-ftp/gftp on all architectures Affected versions < 2.0.18-r1 Unaffected versions >= 2.0.18-r1 Background gFTP is a GNOME based, multi-threaded file transfer client. Description gFTP lacks input validation of filenames received by remote servers. Impact An attacker could entice a user to connect to a malicious FTP server and conduct a directory traversal attack by making use of specially crafted filenames. This could lead to arbitrary files being created or overwritten. Workaround There is no known workaround at this time. Resolution All gFTP users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=net-ftp/gftp-2.0.18-r1" References gFTP Announcement CAN-2005-0372