Lucene search

K
freebsdFreeBSD533D20E7-F71F-11DF-9AE1-000BCDF0A03B
HistoryNov 02, 2010 - 12:00 a.m.

proftpd -- remote code execution vulnerability

2010-11-0200:00:00
vuxml.freebsd.org
27

0.964 High

EPSS

Percentile

99.6%

Tippingpoint reports:

This vulnerability allows remote attackers to execute arbitrary
code on vulnerable installations of ProFTPD. Authentication is not
required to exploit this vulnerability.
The flaw exists within the proftpd server component which
listens by default on TCP port 21. When reading user input if a
TELNET_IAC escape sequence is encountered the process
miscalculates a buffer length counter value allowing a user
controlled copy of data to a stack buffer. A remote attacker can
exploit this vulnerability to execute arbitrary code under the
context of the proftpd process.

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchproftpd< 1.3.3cUNKNOWN