ALT Linux Bugzilla – #24471
ProFTPD Directory Traversal and Buffer Overflow Vulnerabilities
Last modified: 2010-11-04 12:38:45
You need to
before you can comment on or make changes to this bug.
Two vulnerabilities have been reported in ProFTPD, which can be exploited by
malicious users to manipulate certain data and malicious people to compromise a
1) A logic error within the "pr_netio_telnet_gets()" function in src/netio.c
when processing user input containing the Telnet IAC (Interpret As Command)
escape sequence can be exploited to cause a stack-based buffer overflow by
sending specially crafted input to the FTP or FTPS service.
Successful exploitation may allow execution of arbitrary code.
2) An input validation error within the "mod_site_misc" module can be exploited
to e.g. create and delete directories, create symlinks, and change the time of
files located outside a writable directory.
Successful exploitation requires that ProFTPD is compiled with the
"mod_site_misc" module and the attacker has write access to a directory.
Fixed in 1.3.3c
до завтра отправлю
P.S. блин, я ж смотрел!
proftpd-1.3.3rel-alt2 -> sisyphus:
* Thu Nov 04 2010 Afanasov Dmitry <ender@altlinux> 1.3.3rel-alt2
- 1.3.3c stable release (closes: #24471)