Multiple stack-based buffer overflows in the pr_netio_telnet_gets function in netio.c in ProFTPD before 1.3.3c allow remote attackers to execute arbitrary code via vectors involving a TELNET IAC escape character to a (1) FTP or (2) FTPS server.
bugs.proftpd.org/show_bug.cgi?id=3521
secunia.com/advisories/42052
secunia.com/advisories/42217
www.mandriva.com/security/advisories?name=MDVSA-2010:227
www.proftpd.org/docs/NEWS-1.3.3c
www.securityfocus.com/bid/44562
www.vupen.com/english/advisories/2010/2941
www.vupen.com/english/advisories/2010/2959
www.vupen.com/english/advisories/2010/2962
www.zerodayinitiative.com/advisories/ZDI-10-229/
lists.fedoraproject.org/pipermail/package-announce/2010-November/050687.html
lists.fedoraproject.org/pipermail/package-announce/2010-November/050703.html
lists.fedoraproject.org/pipermail/package-announce/2010-November/050726.html