CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
AI Score
Confidence
High
EPSS
Percentile
96.7%
Heap-based buffer overflow in the sql_prepare_where function (contrib/mod_sql.c) in ProFTPD before 1.3.3d, when mod_sql is enabled, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted username containing substitution tags, which are not properly handled during construction of an SQL query.
Vendor | Product | Version | CPE |
---|---|---|---|
proftpd | proftpd | * | cpe:2.3:a:proftpd:proftpd:*:c:*:*:*:*:*:* |
proftpd | proftpd | 1.2.0 | cpe:2.3:a:proftpd:proftpd:1.2.0:*:*:*:*:*:*:* |
proftpd | proftpd | 1.2.0 | cpe:2.3:a:proftpd:proftpd:1.2.0:pre10:*:*:*:*:*:* |
proftpd | proftpd | 1.2.0 | cpe:2.3:a:proftpd:proftpd:1.2.0:pre9:*:*:*:*:*:* |
proftpd | proftpd | 1.2.0 | cpe:2.3:a:proftpd:proftpd:1.2.0:rc1:*:*:*:*:*:* |
proftpd | proftpd | 1.2.0 | cpe:2.3:a:proftpd:proftpd:1.2.0:rc2:*:*:*:*:*:* |
proftpd | proftpd | 1.2.0 | cpe:2.3:a:proftpd:proftpd:1.2.0:rc3:*:*:*:*:*:* |
proftpd | proftpd | 1.2.1 | cpe:2.3:a:proftpd:proftpd:1.2.1:*:*:*:*:*:*:* |
proftpd | proftpd | 1.2.2 | cpe:2.3:a:proftpd:proftpd:1.2.2:*:*:*:*:*:*:* |
proftpd | proftpd | 1.2.2 | cpe:2.3:a:proftpd:proftpd:1.2.2:rc1:*:*:*:*:*:* |
bugs.proftpd.org/show_bug.cgi?id=3536
lists.fedoraproject.org/pipermail/package-announce/2011-January/053537.html
lists.fedoraproject.org/pipermail/package-announce/2011-January/053540.html
phrack.org/issues.html?issue=67&id=7#article
proftpd.org/docs/RELEASE_NOTES-1.3.3d
www.debian.org/security/2011/dsa-2191
www.mandriva.com/security/advisories?name=MDVSA-2011:023
www.securityfocus.com/bid/44933
www.vupen.com/english/advisories/2011/0248
www.vupen.com/english/advisories/2011/0331
bugzilla.redhat.com/show_bug.cgi?id=670170