First published: Sat Dec 31 2005(Updated: )
Buffer overflow in mod_radius in ProFTPD before 1.3.0rc2 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long password.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ProFTPD | =1.2 | |
ProFTPD | =1.2.0_rc1 | |
ProFTPD | =1.2.0_rc2 | |
ProFTPD | =1.2.0_rc3 | |
ProFTPD | =1.2.1 | |
ProFTPD | =1.2.2 | |
ProFTPD | =1.2.2_rc1 | |
ProFTPD | =1.2.2_rc3 | |
ProFTPD | =1.2.3 | |
ProFTPD | =1.2.4 | |
ProFTPD | =1.2.5 | |
ProFTPD | =1.2.5_rc1 | |
ProFTPD | =1.2.6 | |
ProFTPD | =1.2.7 | |
ProFTPD | =1.2.7_rc1 | |
ProFTPD | =1.2.7_rc2 | |
ProFTPD | =1.2.7_rc3 | |
ProFTPD | =1.2.8 | |
ProFTPD | =1.2.8_rc1 | |
ProFTPD | =1.2.8_rc2 | |
ProFTPD | =1.2.9 | |
ProFTPD | =1.2.9_rc1 | |
ProFTPD | =1.2.9_rc2 | |
ProFTPD | =1.2.9_rc3 | |
ProFTPD | =1.2.10 | |
ProFTPD | =1.2_pre1 | |
ProFTPD | =1.2_pre2 | |
ProFTPD | =1.2_pre3 | |
ProFTPD | =1.2_pre4 | |
ProFTPD | =1.2_pre5 | |
ProFTPD | =1.2_pre6 | |
ProFTPD | =1.2_pre7 | |
ProFTPD | =1.2_pre8 | |
ProFTPD | =1.2_pre9 | |
ProFTPD | =1.2_pre10 | |
ProFTPD | =1.2_pre11 | |
ProFTPD | =1.3.0_rc1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-4816 has been classified as having a high severity because it allows remote attackers to cause a denial of service and potentially execute arbitrary code.
To fix CVE-2005-4816, upgrade to ProFTPD version 1.3.0rc2 or later, which addresses the buffer overflow vulnerability.
CVE-2005-4816 affects several versions of ProFTPD including all versions prior to 1.3.0rc2.
CVE-2005-4816 can be exploited by attackers sending long passwords, leading to a buffer overflow condition that may crash the service or execute arbitrary code.
Yes, CVE-2005-4816 is considered a remote code execution vulnerability since it can allow attackers to execute arbitrary code under certain conditions.