[Secure-testing-team] Bug#602279: Buffer overflow in netio
Francesco Paolo Lovergine
frankie at debian.org
Wed Nov 3 10:02:05 UTC 2010
Package: proftpd-dfsg
Version: 1.3.3a-4
Severity: serious
Tags: security
See http://bugs.proftpd.org/show_bug.cgi?id=3521
This vulnerability allows remote attackers to execute arbitrary code on
vulnerable installations of ProFTPD. Authentication is not required to
exploit this vulnerability.
Note that this does not apply to pre 1.3.2 series.
-- System Information:
Debian Release: squeeze/sid
APT prefers unstable
APT policy: (500, 'unstable'), (500, 'testing'), (1, 'experimental')
Architecture: i386 (i686)
Kernel: Linux 2.6.32-5-686 (SMP w/1 CPU core)
Locale: LANG=it_IT.UTF-8, LC_CTYPE=it_IT.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
More information about the Secure-testing-team
mailing list