First published: Mon Jan 17 2011(Updated: )
A heap-based buffer overflow flaw was found in the way ProFTPD FTP server prepared SQL queries for certain usernames, when the mod_sql module was enabled. A remote, unauthenticated attacker could use this flaw to cause proftpd daemon to crash or, potentially, to execute arbitrary code with the privileges of the user running 'proftpd' via a specially-crafted username, provided in the authentication dialog. Upstream bug report: [1] <a href="http://bugs.proftpd.org/show_bug.cgi?id=3536">http://bugs.proftpd.org/show_bug.cgi?id=3536</a> References: [2] <a href="http://www.securityfocus.com/bid/44933">http://www.securityfocus.com/bid/44933</a> [3] <a href="http://phrack.org/issues.html?issue=67&id=7#article">http://phrack.org/issues.html?issue=67&id=7#article</a> [4] <a href="http://bugs.gentoo.org/show_bug.cgi?id=348998">http://bugs.gentoo.org/show_bug.cgi?id=348998</a> [5] <a href="http://proftpd.org/docs/RELEASE_NOTES-1.3.3d">http://proftpd.org/docs/RELEASE_NOTES-1.3.3d</a> (ProFTPD v1.3.3d release notes) CVE identifier: [6] <a href="http://www.openwall.com/lists/oss-security/2011/01/14/6">http://www.openwall.com/lists/oss-security/2011/01/14/6</a>
Affected Software | Affected Version | How to fix |
---|---|---|
ProFTPD | =1.3.3d |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-670170 is high due to the potential for remote code execution or server crashes.
To mitigate REDHAT-BUG-670170, upgrade ProFTPD to a patched version that resolves this heap-based buffer overflow vulnerability.
Users of ProFTPD version 1.3.3d with the mod_sql module enabled are affected by REDHAT-BUG-670170.
An attacker could exploit REDHAT-BUG-670170 to potentially execute arbitrary code or crash the ProFTPD daemon.
No, exploitation of REDHAT-BUG-670170 can be achieved by a remote, unauthenticated attacker.