[Secure-testing-team] Re: proftpd, low impact DoS bug
Stefan Fritsch
sf at sfritsch.de
Wed Nov 29 09:44:45 CET 2006
Hi,
On Tue, 28 Nov 2006, Moritz Muehlenhoff wrote:
> We have two different issues here:
AIUI, we have three different issues.
> A denial of service vulnerability discovered by Ralf Engelschall. That's
> what we've fixed so far. It's tracked as CVE-2006-5815 by several
> distributions by now. Although it's not suitable for code injection, it's
> still a DoS vulnerability.
This is the CommandBufferSize issue, I think. This was fixed by -13 and
the DSA. I don't know why this was called CVE-2006-5815. The proftpd
people don't think it is severe [1].
>
> The sreplace() issue.
This is the original CVE-2006-5815, but no info was available for weeks.
Existance was announced on Nov 6, disclosure of info was on Nov 27. [1]
Then there is a third issue in mod_tls, in tls_x509_name_oneline().
Disclosure was on Nov 28. [2] I assumed that mod_tls was not enabled by
default, so I set the severity to medium in the tracker. If mod_tls is on
by default, it is of course 'high'.
Cheers,
Stefan
[1] http://bugs.proftpd.org/show_bug.cgi?id=2858
[2] http://seclists.org/bugtraq/2006/Nov/0549.html
More information about the Secure-testing-team
mailing list