Multiple stack-based buffer overflows in the pr_netio_telnet_gets function in netio.c in ProFTPD before 1.3.3c allow remote attackers to execute arbitrary code via vectors involving a TELNET IAC escape character to a (1) FTP or (2) FTPS server.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 12 | all | proftpd-dfsg | < 1.3.3a-5 | proftpd-dfsg_1.3.3a-5_all.deb |
Debian | 11 | all | proftpd-dfsg | < 1.3.3a-5 | proftpd-dfsg_1.3.3a-5_all.deb |
Debian | 10 | all | proftpd-dfsg | < 1.3.3a-5 | proftpd-dfsg_1.3.3a-5_all.deb |
Debian | 999 | all | proftpd-dfsg | < 1.3.3a-5 | proftpd-dfsg_1.3.3a-5_all.deb |
Debian | 13 | all | proftpd-dfsg | < 1.3.3a-5 | proftpd-dfsg_1.3.3a-5_all.deb |