First published: Mon Jan 17 2011(Updated: )
A heap-based buffer overflow flaw was found in the way ProFTPD FTP server prepared SQL queries for certain usernames, when the mod_sql module was enabled. A remote, unauthenticated attacker could use this flaw to cause proftpd daemon to crash or, potentially, to execute arbitrary code with the privileges of the user running 'proftpd' via a specially-crafted username, provided in the authentication dialog. Upstream bug report: [1] <a href="http://bugs.proftpd.org/show_bug.cgi?id=3536">http://bugs.proftpd.org/show_bug.cgi?id=3536</a> References: [2] <a href="http://www.securityfocus.com/bid/44933">http://www.securityfocus.com/bid/44933</a> [3] <a href="http://phrack.org/issues.html?issue=67&id=7#article">http://phrack.org/issues.html?issue=67&id=7#article</a> [4] <a href="http://bugs.gentoo.org/show_bug.cgi?id=348998">http://bugs.gentoo.org/show_bug.cgi?id=348998</a> [5] <a href="http://proftpd.org/docs/RELEASE_NOTES-1.3.3d">http://proftpd.org/docs/RELEASE_NOTES-1.3.3d</a> (ProFTPD v1.3.3d release notes) CVE identifier: [6] <a href="http://www.openwall.com/lists/oss-security/2011/01/14/6">http://www.openwall.com/lists/oss-security/2011/01/14/6</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
ProFTPD | <=1.3.3 | |
ProFTPD | =1.2.0 | |
ProFTPD | =1.2.0-pre10 | |
ProFTPD | =1.2.0-pre9 | |
ProFTPD | =1.2.0-rc1 | |
ProFTPD | =1.2.0-rc2 | |
ProFTPD | =1.2.0-rc3 | |
ProFTPD | =1.2.1 | |
ProFTPD | =1.2.2 | |
ProFTPD | =1.2.2-rc1 | |
ProFTPD | =1.2.2-rc2 | |
ProFTPD | =1.2.2-rc3 | |
ProFTPD | =1.2.3 | |
ProFTPD | =1.2.4 | |
ProFTPD | =1.2.5 | |
ProFTPD | =1.2.5-rc1 | |
ProFTPD | =1.2.5-rc2 | |
ProFTPD | =1.2.5-rc3 | |
ProFTPD | =1.2.6 | |
ProFTPD | =1.2.6-rc1 | |
ProFTPD | =1.2.6-rc2 | |
ProFTPD | =1.2.7 | |
ProFTPD | =1.2.7-rc1 | |
ProFTPD | =1.2.7-rc2 | |
ProFTPD | =1.2.7-rc3 | |
ProFTPD | =1.2.8 | |
ProFTPD | =1.2.8-rc1 | |
ProFTPD | =1.2.8-rc2 | |
ProFTPD | =1.2.9 | |
ProFTPD | =1.2.9-rc1 | |
ProFTPD | =1.2.9-rc2 | |
ProFTPD | =1.2.9-rc3 | |
ProFTPD | =1.2.10 | |
ProFTPD | =1.2.10-rc1 | |
ProFTPD | =1.2.10-rc2 | |
ProFTPD | =1.2.10-rc3 | |
ProFTPD | =1.3.0 | |
ProFTPD | =1.3.0-a | |
ProFTPD | =1.3.0-rc1 | |
ProFTPD | =1.3.0-rc2 | |
ProFTPD | =1.3.0-rc3 | |
ProFTPD | =1.3.0-rc4 | |
ProFTPD | =1.3.0-rc5 | |
ProFTPD | =1.3.1 | |
ProFTPD | =1.3.1-rc1 | |
ProFTPD | =1.3.1-rc2 | |
ProFTPD | =1.3.1-rc3 | |
ProFTPD | =1.3.2 | |
ProFTPD | =1.3.2-a | |
ProFTPD | =1.3.2-b | |
ProFTPD | =1.3.2-c | |
ProFTPD | =1.3.2-d | |
ProFTPD | =1.3.2-e | |
ProFTPD | =1.3.2-rc1 | |
ProFTPD | =1.3.2-rc2 | |
ProFTPD | =1.3.2-rc3 | |
ProFTPD | =1.3.2-rc4 | |
ProFTPD | =1.3.3 | |
ProFTPD | =1.3.3-a | |
ProFTPD | =1.3.3-b | |
ProFTPD | =1.3.3-rc1 | |
ProFTPD | =1.3.3-rc2 | |
ProFTPD | =1.3.3-rc3 | |
ProFTPD | =1.3.3-rc4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.