10 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
9.4 High
AI Score
Confidence
High
0.964 High
EPSS
Percentile
99.6%
Multiple stack-based buffer overflows in the pr_netio_telnet_gets function in netio.c in ProFTPD before 1.3.3c allow remote attackers to execute arbitrary code via vectors involving a TELNET IAC escape character to a (1) FTP or (2) FTPS server.
CPE | Name | Operator | Version |
---|---|---|---|
proftpd:proftpd | proftpd | eq | 1.3.2 |
proftpd:proftpd | proftpd | eq | 1.3.3 |
bugs.proftpd.org/show_bug.cgi?id=3521
lists.fedoraproject.org/pipermail/package-announce/2010-November/050687.html
lists.fedoraproject.org/pipermail/package-announce/2010-November/050703.html
lists.fedoraproject.org/pipermail/package-announce/2010-November/050726.html
secunia.com/advisories/42052
secunia.com/advisories/42217
www.mandriva.com/security/advisories?name=MDVSA-2010:227
www.proftpd.org/docs/NEWS-1.3.3c
www.securityfocus.com/bid/44562
www.vupen.com/english/advisories/2010/2941
www.vupen.com/english/advisories/2010/2959
www.vupen.com/english/advisories/2010/2962
www.zerodayinitiative.com/advisories/ZDI-10-229/