<?xml version="1.0" encoding="UTF-8" ?>

<bugzilla version="5.2"
          urlbase="https://bugzilla.altlinux.org/"
          
          maintainer="jenya@basealt.ru"
>

    <bug>
          <bug_id>24471</bug_id>
          
          <creation_ts>2010-11-01 16:08:54 +0300</creation_ts>
          <short_desc>ProFTPD Directory Traversal and Buffer Overflow Vulnerabilities</short_desc>
          <delta_ts>2010-11-04 12:38:45 +0300</delta_ts>
          <reporter_accessible>1</reporter_accessible>
          <cclist_accessible>1</cclist_accessible>
          <classification_id>4</classification_id>
          <classification>Development</classification>
          <product>Sisyphus</product>
          <component>proftpd</component>
          <version>unstable</version>
          <rep_platform>all</rep_platform>
          <op_sys>Linux</op_sys>
          <bug_status>CLOSED</bug_status>
          <resolution>FIXED</resolution>
          
          
          <bug_file_loc>http://secunia.com/advisories/42052/</bug_file_loc>
          <status_whiteboard></status_whiteboard>
          <keywords>security</keywords>
          <priority>P3</priority>
          <bug_severity>blocker</bug_severity>
          <target_milestone>---</target_milestone>
          
          
          <everconfirmed>1</everconfirmed>
          <reporter name="Vladimir Lettiev">crux</reporter>
          <assigned_to name="Afanasov Dmitry">ender</assigned_to>
          <cc>ender</cc>
    
    <cc>lakostis</cc>
          
          <qa_contact>qa-sisyphus</qa_contact>

      

      

      

          <comment_sort_order>oldest_to_newest</comment_sort_order>  
          <long_desc isprivate="0" >
    <commentid>114680</commentid>
    <comment_count>0</comment_count>
    <who name="Vladimir Lettiev">crux</who>
    <bug_when>2010-11-01 16:08:54 +0300</bug_when>
    <thetext>Two vulnerabilities have been reported in ProFTPD, which can be exploited by malicious users to manipulate certain data and malicious people to compromise a vulnerable system.

1) A logic error within the &quot;pr_netio_telnet_gets()&quot; function in src/netio.c when processing user input containing the Telnet IAC (Interpret As Command) escape sequence can be exploited to cause a stack-based buffer overflow by sending specially crafted input to the FTP or FTPS service.

Successful exploitation may allow execution of arbitrary code.

2) An input validation error within the &quot;mod_site_misc&quot; module can be exploited to e.g. create and delete directories, create symlinks, and change the time of files located outside a writable directory.

Successful exploitation requires that ProFTPD is compiled with the &quot;mod_site_misc&quot; module and the attacker has write access to a directory.

Fixed in 1.3.3c</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>114681</commentid>
    <comment_count>1</comment_count>
    <who name="Afanasov Dmitry">ender</who>
    <bug_when>2010-11-01 16:14:20 +0300</bug_when>
    <thetext>до завтра отправлю
P.S. блин, я ж смотрел!</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>114822</commentid>
    <comment_count>2</comment_count>
    <who name="Repository Robot">repository-robot</who>
    <bug_when>2010-11-04 12:38:45 +0300</bug_when>
    <thetext>proftpd-1.3.3rel-alt2 -&gt; sisyphus:

* Thu Nov 04 2010 Afanasov Dmitry &lt;ender@altlinux&gt; 1.3.3rel-alt2
- 1.3.3c stable release (closes: #24471)</thetext>
  </long_desc>
      
      

    </bug>

</bugzilla>