[Secure-testing-team] Bug#602279: Buffer overflow in netio

Francesco Paolo Lovergine frankie at debian.org
Wed Nov 3 10:02:05 UTC 2010


Package: proftpd-dfsg
Version: 1.3.3a-4
Severity: serious
Tags: security

See http://bugs.proftpd.org/show_bug.cgi?id=3521

This vulnerability allows remote attackers to execute arbitrary code on
vulnerable installations of ProFTPD. Authentication is not required to
exploit this vulnerability. 

Note that this does not apply to pre 1.3.2 series.

-- System Information:
Debian Release: squeeze/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'testing'), (1, 'experimental')
Architecture: i386 (i686)

Kernel: Linux 2.6.32-5-686 (SMP w/1 CPU core)
Locale: LANG=it_IT.UTF-8, LC_CTYPE=it_IT.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash





More information about the Secure-testing-team mailing list