First published: Thu Mar 03 2011(Updated: )
An integer overflow flaw was reported [1],[2] in the mod_sftp module of ProFTPD. If a specially crafted SSH message was sent to a ProFTPD server using mod_sftp, it could lead to the allocation of enormous amounts of memory and an eventual OOM termination by the kernel. This issue was assigned the name <a href="https://access.redhat.com/security/cve/CVE-2011-1137">CVE-2011-1137</a> [3]. It was fixed in CVS [4],[5],[6] References: [1] <a href="http://bugs.proftpd.org/show_bug.cgi?id=3586">http://bugs.proftpd.org/show_bug.cgi?id=3586</a> [2] <a href="http://www.exploit-db.com/exploits/16129/">http://www.exploit-db.com/exploits/16129/</a> [3] <a href="http://www.openwall.com/lists/oss-security/2011/03/02/5">http://www.openwall.com/lists/oss-security/2011/03/02/5</a> [4] <a href="http://proftp.cvs.sourceforge.net/viewvc/proftp/proftpd/contrib/mod_sftp/packet.c?r1=1.14.2.2&r2=1.14.2.3">http://proftp.cvs.sourceforge.net/viewvc/proftp/proftpd/contrib/mod_sftp/packet.c?r1=1.14.2.2&r2=1.14.2.3</a> [5] <a href="http://proftp.cvs.sourceforge.net/viewvc/proftp/proftpd/contrib/mod_sftp/packet.h?r1=1.3&r2=1.3.2.1">http://proftp.cvs.sourceforge.net/viewvc/proftp/proftpd/contrib/mod_sftp/packet.h?r1=1.3&r2=1.3.2.1</a> [6] <a href="http://proftp.cvs.sourceforge.net/viewvc/proftp/proftpd/contrib/mod_sftp/mod_sftp.c?r1=1.29.2.1&r2=1.29.2.2">http://proftp.cvs.sourceforge.net/viewvc/proftp/proftpd/contrib/mod_sftp/mod_sftp.c?r1=1.29.2.1&r2=1.29.2.2</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Proftpd Proftpd | =1.2.0-rc1 | |
Proftpd Proftpd | =1.3.3-b | |
Proftpd Proftpd | =1.3.3-rc4 | |
Proftpd Proftpd | =1.2.0 | |
Proftpd Proftpd | =1.3.1-rc2 | |
Proftpd Proftpd | =1.3.0-rc1 | |
Proftpd Proftpd | =1.2.0-rc2 | |
Proftpd Proftpd | =1.3.3-c | |
Proftpd Proftpd | =1.3.2-d | |
Proftpd Proftpd | =1.2.0-pre10 | |
Proftpd Proftpd | =1.2.2-rc1 | |
Proftpd Proftpd | =1.3.0-a | |
Proftpd Proftpd | =1.2.3 | |
Proftpd Proftpd | =1.3.0-rc4 | |
Proftpd Proftpd | =1.3.1-rc3 | |
Proftpd Proftpd | =1.2.5-rc1 | |
Proftpd Proftpd | =1.3.2-a | |
Proftpd Proftpd | =1.3.3-rc2 | |
Proftpd Proftpd | =1.2.8-rc1 | |
Proftpd Proftpd | =1.2.7 | |
Proftpd Proftpd | =1.2.2 | |
Proftpd Proftpd | =1.2.7-rc2 | |
Proftpd Proftpd | =1.3.2-c | |
Proftpd Proftpd | =1.2.10 | |
Proftpd Proftpd | =1.3.2-e | |
Proftpd Proftpd | =1.2.10-rc2 | |
Proftpd Proftpd | =1.3.1 | |
Proftpd Proftpd | =1.3.2 | |
Proftpd Proftpd | =1.2.8 | |
Proftpd Proftpd | =1.3.3-rc3 | |
Proftpd Proftpd | =1.3.0 | |
Proftpd Proftpd | =1.2.10-rc1 | |
Proftpd Proftpd | =1.2.1 | |
Proftpd Proftpd | =1.3.1-rc1 | |
Proftpd Proftpd | =1.2.9-rc2 | |
Proftpd Proftpd | =1.2.7-rc1 | |
Proftpd Proftpd | =1.2.7-rc3 | |
Proftpd Proftpd | =1.3.0-rc5 | |
Proftpd Proftpd | =1.3.3-a | |
Proftpd Proftpd | =1.3.2-rc1 | |
Proftpd Proftpd | =1.2.4 | |
Proftpd Proftpd | =1.2.5 | |
Proftpd Proftpd | =1.2.0-pre9 | |
Proftpd Proftpd | =1.2.2-rc3 | |
Proftpd Proftpd | =1.3.2-rc2 | |
Proftpd Proftpd | =1.3.2-rc3 | |
Proftpd Proftpd | =1.2.5-rc3 | |
Proftpd Proftpd | =1.2.9-rc3 | |
Proftpd Proftpd | =1.2.0-rc3 | |
Proftpd Proftpd | <=1.3.3 | |
Proftpd Proftpd | =1.3.2-b | |
Proftpd Proftpd | =1.2.6-rc2 | |
Proftpd Proftpd | =1.3.2-rc4 | |
Proftpd Proftpd | =1.2.5-rc2 | |
Proftpd Proftpd | =1.2.10-rc3 | |
Proftpd Proftpd | =1.2.9 | |
Proftpd Proftpd | =1.2.2-rc2 | |
Proftpd Proftpd | =1.2.8-rc2 | |
Proftpd Proftpd | =1.3.0-rc2 | |
Proftpd Proftpd | =1.2.6-rc1 | |
Proftpd Proftpd | =1.2.9-rc1 | |
Proftpd Proftpd | =1.3.3 | |
Proftpd Proftpd | =1.2.6 | |
Proftpd Proftpd | =1.3.3-rc1 | |
Proftpd Proftpd | =1.3.0-rc3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.