First published: Mon Jan 17 2011(Updated: )
A heap-based buffer overflow flaw was found in the way ProFTPD FTP server prepared SQL queries for certain usernames, when the mod_sql module was enabled. A remote, unauthenticated attacker could use this flaw to cause proftpd daemon to crash or, potentially, to execute arbitrary code with the privileges of the user running 'proftpd' via a specially-crafted username, provided in the authentication dialog. Upstream bug report: [1] <a href="http://bugs.proftpd.org/show_bug.cgi?id=3536">http://bugs.proftpd.org/show_bug.cgi?id=3536</a> References: [2] <a href="http://www.securityfocus.com/bid/44933">http://www.securityfocus.com/bid/44933</a> [3] <a href="http://phrack.org/issues.html?issue=67&id=7#article">http://phrack.org/issues.html?issue=67&id=7#article</a> [4] <a href="http://bugs.gentoo.org/show_bug.cgi?id=348998">http://bugs.gentoo.org/show_bug.cgi?id=348998</a> [5] <a href="http://proftpd.org/docs/RELEASE_NOTES-1.3.3d">http://proftpd.org/docs/RELEASE_NOTES-1.3.3d</a> (ProFTPD v1.3.3d release notes) CVE identifier: [6] <a href="http://www.openwall.com/lists/oss-security/2011/01/14/6">http://www.openwall.com/lists/oss-security/2011/01/14/6</a>
Affected Software | Affected Version | How to fix |
---|---|---|
ProFTPD | =1.3.3d |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.