Page 2 of 30 results (0.013 seconds)

CVSS: 5.5EPSS: 0%CPEs: 6EXPL: 0

04 Apr 2017 — ProFTPD before 1.3.5e and 1.3.6 before 1.3.6rc5 controls whether the home directory of a user could contain a symbolic link through the AllowChrootSymlinks configuration option, but checks only the last path component when enforcing AllowChrootSymlinks. Attackers with local access could bypass the AllowChrootSymlinks control by replacing a path component (other than the last one) with a symbolic link. The threat model includes an attacker who is not granted full filesystem access by a hosting provider, but ... • http://bugs.proftpd.org/show_bug.cgi?id=4295 • CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVSS: 7.5EPSS: 0%CPEs: 5EXPL: 0

05 Apr 2016 — The mod_tls module in ProFTPD before 1.3.5b and 1.3.6 before 1.3.6rc2 does not properly handle the TLSDHParamFile directive, which might cause a weaker than intended Diffie-Hellman (DH) key to be used and consequently allow attackers to have unspecified impact via unknown vectors. El módulo mod_tls en ProFTPD en versiones anteriores a 1.3.5b y 1.3.6 en versiones anteriores a 1.3.6rc2 no maneja correctamente la directiva TLSDHParamFile, lo cual puede causar que se utilice una clave Diffie-Hellman (DH) más dé... • http://bugs.proftpd.org/show_bug.cgi?id=4230 • CWE-254: 7PK - Security Features CWE-310: Cryptographic Issues •

CVSS: 8.1EPSS: 0%CPEs: 68EXPL: 0

24 Jan 2013 — ProFTPD before 1.3.5rc1, when using the UserOwner directive, allows local users to modify the ownership of arbitrary files via a race condition and a symlink attack on the (1) MKD or (2) XMKD commands. ProFTPD anterior a v1.3.5rc1, cuando se usa con la directiva UserOwner, permite a usuarios locales modificar la propiedad de archivos arbitrarios a través de una condición de carrera y un ataque de enlace simbólico sobre los comandos (1) MKD o (2) XMKD. Multiple vulnerabilities have been found in ProFTPD, the... • http://bugs.proftpd.org/show_bug.cgi?id=3841 • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •

CVSS: 9.0EPSS: 1%CPEs: 62EXPL: 1

06 Dec 2011 — Use-after-free vulnerability in the Response API in ProFTPD before 1.3.3g allows remote authenticated users to execute arbitrary code via vectors involving an error that occurs after an FTP data transfer. Una vulnerabilidad de uso después de liberación en la API de Respuesta en ProFTPD antes de v1.3.3g permite a usuarios remotos autenticados ejecutar código de su elección a través de vectores que implican un error que se produce después de una transferencia de datos FTP. Multiple vulnerabilities have been f... • http://bugs.proftpd.org/show_bug.cgi?id=3711 • CWE-399: Resource Management Errors •

CVSS: 7.5EPSS: 8%CPEs: 65EXPL: 4

11 Mar 2011 — Integer overflow in the mod_sftp (aka SFTP) module in ProFTPD 1.3.3d and earlier allows remote attackers to cause a denial of service (memory consumption leading to OOM kill) via a malformed SSH message. Desbordamiento de enteros en el módulo mod_sftp (también conocido como SFTP) en ProFTPD v1.3.3d y anteriores, permite a atacantes remotos provocar una denegación de servicio (agotamiento de memoria) a través de un mensaje SSH con formato incorrecto. Multiple vulnerabilities have been found in ProFTPD, the w... • https://www.exploit-db.com/exploits/16129 • CWE-189: Numeric Errors •

CVSS: 9.8EPSS: 16%CPEs: 64EXPL: 2

02 Feb 2011 — Heap-based buffer overflow in the sql_prepare_where function (contrib/mod_sql.c) in ProFTPD before 1.3.3d, when mod_sql is enabled, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted username containing substitution tags, which are not properly handled during construction of an SQL query. Desbordamiento de búfer en la memoria dinámica en la función sql_prepare_where (contrib/mod_sql.c) en ProFTPD anterior a v1.3.3d, cuando mod_sql está habilitado, ... • http://bugs.proftpd.org/show_bug.cgi?id=3536 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 6.5EPSS: 0%CPEs: 48EXPL: 0

09 Nov 2010 — The pr_data_xfer function in ProFTPD before 1.3.2rc3 allows remote authenticated users to cause a denial of service (CPU consumption) via an ABOR command during a data transfer. La función pr_data_xfer en ProFTPD anterior a v1.3.2rc3 permite a usuarios autenticados remotamente provocar una denegación de servicio (agotamiento de CPU) a través de un comando ABOR durante una transferencia de datos. • http://bugs.proftpd.org/show_bug.cgi?id=3131 • CWE-399: Resource Management Errors •

CVSS: 7.5EPSS: 0%CPEs: 7EXPL: 0

28 Oct 2009 — The mod_tls module in ProFTPD before 1.3.2b, and 1.3.3 before 1.3.3rc2, when the dNSNameRequired TLS option is enabled, does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 client certificate, which allows remote attackers to bypass intended client-hostname restrictions via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408. El módulo mod_tls en ProFTPD anterior v1.3.2b, y v1.3.3 anterior v1.3.3rc2, c... • http://bugs.proftpd.org/show_bug.cgi?id=3275 • CWE-310: Cryptographic Issues •

CVSS: 9.8EPSS: 53%CPEs: 1EXPL: 0

22 Apr 2007 — The Auth API in ProFTPD before 20070417, when multiple simultaneous authentication modules are configured, does not require that the module that checks authentication is the same as the module that retrieves authentication data, which might allow remote attackers to bypass authentication, as demonstrated by use of SQLAuthTypes Plaintext in mod_sql, with data retrieved from /etc/passwd. El API en ProFTPD anterior 20070417, cuando se configuran múltiples módulos de validación de forma simultanea, no requiere ... • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=419255 •

CVSS: 9.8EPSS: 49%CPEs: 1EXPL: 2

30 Nov 2006 — Buffer overflow in the tls_x509_name_oneline function in the mod_tls module, as used in ProFTPD 1.3.0a and earlier, and possibly other products, allows remote attackers to execute arbitrary code via a large data length argument, a different vulnerability than CVE-2006-5815. Desbordamiento de búfer en la función tls_x509_name_oneline en el módulo mod_tls, tal y como se usa en ProFTPD 1.3.0a y versiones anteriores, y posiblemente otros productos, permite a atacantes remotos ejecutar código de su elección medi... • http://elegerov.blogspot.com/2006/10/do-you-remember-2-years-old-overflow.html •