Page 4 of 19 results (0.028 seconds)

CVSS: 6.8EPSS: 25%CPEs: 64EXPL: 2

Heap-based buffer overflow in the sql_prepare_where function (contrib/mod_sql.c) in ProFTPD before 1.3.3d, when mod_sql is enabled, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted username containing substitution tags, which are not properly handled during construction of an SQL query. Desbordamiento de búfer en la memoria dinámica en la función sql_prepare_where (contrib/mod_sql.c) en ProFTPD anterior a v1.3.3d, cuando mod_sql está habilitado, permite a atacantes remotos provocar una denegación de servicio (caída) y posiblemente ejecutar código de su elección a través de un usuario manipulado que contiene etiquetas de sustitución, lo que no es sustituido adecuadamente durante la construcción de una consulta SQL • http://bugs.proftpd.org/show_bug.cgi?id=3536 http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053537.html http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053540.html http://phrack.org/issues.html?issue=67&id=7#article http://proftpd.org/docs/RELEASE_NOTES-1.3.3d http://www.debian.org/security/2011/dsa-2191 http://www.mandriva.com/security/advisories?name=MDVSA-2011:023 http://www.securityfocus.com/bid/44933 http://www.vupen.com/e • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 10.0EPSS: 93%CPEs: 15EXPL: 7

Multiple stack-based buffer overflows in the pr_netio_telnet_gets function in netio.c in ProFTPD before 1.3.3c allow remote attackers to execute arbitrary code via vectors involving a TELNET IAC escape character to a (1) FTP or (2) FTPS server. Múltiples desbordamientos de búfer basados en pila en la función pr_netio_telnet_gets en netio.c en ProFTPD anterior v1.3.3c permite a atacantes remotos ejecutar código de su elección a través de vectores que involucran un caracter escape TELNET IAC en servidores (1) FTP o (2) FTPS. • https://www.exploit-db.com/exploits/16878 https://www.exploit-db.com/exploits/16851 https://www.exploit-db.com/exploits/15449 http://bugs.proftpd.org/show_bug.cgi?id=3521 http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050687.html http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050703.html http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050726.html http://secunia.com/advisories/42052 http://secunia.com/advisories/42217 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.1EPSS: 0%CPEs: 32EXPL: 1

Multiple directory traversal vulnerabilities in the mod_site_misc module in ProFTPD before 1.3.3c allow remote authenticated users to create directories, delete directories, create symlinks, and modify file timestamps via directory traversal sequences in a (1) SITE MKDIR, (2) SITE RMDIR, (3) SITE SYMLINK, or (4) SITE UTIME command. Múltiple eulnerabilidad de salto de directorio en el módulo mod_site_misc en ProFTPD anterior v1.3.3c permite a usuarios autenticados remotamente crear directorios, borrarlos, crear enlaces simbólicos, y modificar el timestamps de ficheros a través de secuencias de directorio transversal en un comando (1) SITE MKDIR, (2) SITE RMDIR, (3) SITE SYMLINK, o (4) SITE UTIME • http://bugs.proftpd.org/show_bug.cgi?id=3519 http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050687.html http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050703.html http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050726.html http://secunia.com/advisories/42047 http://secunia.com/advisories/42052 http://secunia.com/advisories/42217 http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.498209 http: • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 5.8EPSS: 0%CPEs: 7EXPL: 0

The mod_tls module in ProFTPD before 1.3.2b, and 1.3.3 before 1.3.3rc2, when the dNSNameRequired TLS option is enabled, does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 client certificate, which allows remote attackers to bypass intended client-hostname restrictions via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408. El módulo mod_tls en ProFTPD anterior v1.3.2b, y v1.3.3 anterior v1.3.3rc2, cuando la opción dNSNameRequired TLS es activada, no maneja adecuadamente el caracter '/0' en un nombre de dominio, dentro del campo Subject Alternative Name de un certificado cliente X.509, lo que permite a atacantes remotos eludir las restricciones cliente-hostname a través de un certificado manipulado concedido por una Autoridad Certificadora legítima, esta relacionado con CVE-2009-2408. • http://bugs.proftpd.org/show_bug.cgi?id=3275 http://marc.info/?l=oss-security&m=125630966510672&w=2 http://marc.info/?l=oss-security&m=125632960508211&w=2 http://secunia.com/advisories/37131 http://secunia.com/advisories/37219 http://www.debian.org/security/2009/dsa-1925 http://www.mandriva.com/security/advisories?name=MDVSA-2009:288 http://www.securityfocus.com/bid/36804 https://bugzilla.redhat.com/show_bug.cgi? • CWE-310: Cryptographic Issues •