Saturday, November 24, 2012

FileZilla Client is 3.6.0.1 for All


Information:


Overview:
Welcome to the homepage of FileZilla, the free FTP solution. Both a client and a server are available. FileZilla is open source software distributed free of charge under the terms of the GNU General Public License
Support is available through our forums, the wiki and the bug and feature request trackers.
In addition, you will find documentation on how to compile FileZilla and nightly builds for multiple platforms in the development section

News: 
2012-11-18 - FileZilla Client 3.6.0.1 released

Bugfixes and minor changes:
Fix problems with TLS cipher selection, including a bugfix for GnuTLS
Fix a crash on shutdown
Add log message for servers not using UTF-8
Small performance and memory optimizations getting file types
Improve formatting of transfer speeds
2012-11-10 - FileZilla Client 3.6.0 released

Bugfixes and minor changes:
Fix a crash introduced since 3.5.3
IPv6-only hosts should no longer cause a crash in the network configuration wizard
2012-11-02 - FileZilla Client 3.6.0-rc1 released

Bugfixes and minor changes:
Do not show "Remember passwords?" dialog if connecting anonymously
Make wording in "Remember passwords?" dialog consistent.
Increase default TLS session lifetime
When asking for confirmation to delete files, state whether it's local or on the server
Fix right-to-left rendering of progress line in the transfer queue
2010-01-02 - Subversion repository moved
The address of the subversion repository has changed.
2009-03-03 - Security advisory:
FileZilla Server 0.9.31 fixes a buffer overflow in the SSL/TLS code.

This vulnerability could potentially be used for denial of service attacks.

Affected versions:
All versions prior to 0.9.31 are affected. This vulnerability has been fixed in 0.9.31

2008-07-24 - Security Advisory
FileZilla 3.1.0.1 fixes a vulnerability regarding the way some errors are handled on SSL/TLS secured data transfers.

If the data connection of a transfer gets closed, FileZilla did not check if the server performed an orderly TLS shutdown.

Impact:
An attacker could send spoofed FIN packets to the client. Even though GnuTLS detects this with GNUTLS_E_UNEXPECTED_PACKET_LENGTH, FileZilla did not record a transfer failure in all cases.

Unfortunately not all servers perform an orderly SSL/TLS shutdown. Since this cannot be distinguished from an attack, FileZilla will not be able to download listings or files from such servers.

Affected versions:
All versions prior to 3.1.0.1 are affected. This vulnerability has been fixed in 3.1.0.1


Download for Windows 32bit and 64bit

Download for Mac OS X


0 comments:

Post a Comment

Thanks for Comment. I'll reply you soon.

Twitter Delicious Facebook Digg Stumbleupon Favorites More

 
Powered by Blogger