#VU45393 Heap-based buffer overflow in ProFTPD - CVE-2010-4652
Published: February 2, 2011 / Updated: September 14, 2020
ProFTPD
ProFTPD
Description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in Heap-based buffer overflow in the sql_prepare_where function (contrib/mod_sql.c) in ProFTPD before 1.3.3d, when mod_sql is enabled,. A remote attacker can use a crafted username containing substitution tags to trigger heap-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
Remediation
External links
- http://bugs.proftpd.org/show_bug.cgi?id=3536
- http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053537.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053540.html
- http://phrack.org/issues.html?issue=67&id=7#article
- http://proftpd.org/docs/RELEASE_NOTES-1.3.3d
- http://www.debian.org/security/2011/dsa-2191
- http://www.mandriva.com/security/advisories?name=MDVSA-2011:023
- http://www.securityfocus.com/bid/44933
- http://www.vupen.com/english/advisories/2011/0248
- http://www.vupen.com/english/advisories/2011/0331
- https://bugzilla.redhat.com/show_bug.cgi?id=670170