Back to search

ProFTPD "mod_tls" Buffer Overflow

Severity CVSS Published Added Modified
8 (AV:N/AC:L/Au:N/C:P/I:P/A:P) November 28, 2006 January 31, 2007 December 04, 2013

Description

ProFTPD is vulnerable to a buffer overflow in the "tls_x509_name_oneline()" function in mod_tls.c which may allow an attacker to run arbitrary code under the user context of the ProFTPD process.

Successful exploitation of this vulnerability requires that mod_tls is compiled into ProFTPD.

Free Nexpose Download

Discover, prioritize, and remediate security risks today!

 Download now

References

Solution

Upgrade to ProFTPD 1.3.1rc1

Download and apply the upgrade from: ftp://ftp.proftpd.org/distrib/source/proftpd-1.3.1rc1.tar.gz

Upgrade to ProFTPD version 1.3.1rc1, released on December 12, 2006. See the ProFTPD website for more information on the release, including upgrade instructions.

Related Vulnerabilities