First published: Wed Nov 08 2006(Updated: )
Stack-based buffer overflow in the sreplace function in ProFTPD 1.3.0 and earlier allows remote attackers, probably authenticated, to cause a denial of service and execute arbitrary code, as demonstrated by vd_proftpd.pm, a "ProFTPD remote exploit."
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ProFTPD | <=1.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-5815 has a high severity rating due to the potential for remote code execution and denial of service.
To fix CVE-2006-5815, upgrade ProFTPD to version 1.3.1 or later where the vulnerability is patched.
CVE-2006-5815 affects users of ProFTPD version 1.3.0 and earlier.
CVE-2006-5815 enables remote attackers to exploit a buffer overflow for arbitrary code execution.
Exploitation of CVE-2006-5815 is likely to require authentication by the attacker.