USN-6589-1: FileZilla vulnerability
18 January 2024
FileZilla could be made to expose sensitive information over the network.
Releases
Packages
- filezilla - Full-featured graphical FTP/FTPS/SFTP client
Details
Fabian Baeumer, Marcus Brinkmann and Joerg Schwenk discovered that the SSH
protocol used in FileZilla is prone to a prefix truncation attack, known as
the "Terrapin attack". A remote attacker could use this issue to downgrade or
disable some security features and obtain sensitive information.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 23.10
Ubuntu 22.04
Ubuntu 20.04
In general, a standard system update will make all the necessary changes.
References
Related notices
- USN-6560-1: openssh-client, openssh, openssh-server, openssh-sftp-server, openssh-tests, ssh, ssh-askpass-gnome
- USN-6561-1: libssh-gcrypt-4, libssh-doc, libssh-gcrypt-dev, libssh, libssh-dev, libssh-4
- USN-6560-2: openssh-client, openssh, ssh-krb5, openssh-server, openssh-client-ssh1, openssh-sftp-server, ssh, ssh-askpass-gnome
- USN-6585-1: libssh2, libssh2-1, libssh2-1-dev
- USN-6598-1: paramiko, python3-paramiko, paramiko-doc
- USN-6738-1: lxd, lxd-tools, lxd-client, golang-github-lxc-lxd-dev, lxc2
- USN-7051-1: python3-asyncssh, python-asyncssh, python-asyncssh-doc