Buffer overflow in mod_radius in ProFTPD before 1.3.0rc2 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long password.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:05
Type | Values Removed | Values Added |
---|---|---|
References | () http://archives.neohapsis.com/archives/dailydave/2006-q1/0122.html - | |
References | () http://bugs.proftpd.org/show_bug.cgi?id=2658 - | |
References | () http://www.debian.org/security/2007/dsa-1245 - | |
References | () http://www.osvdb.org/23063 - | |
References | () http://www.securityfocus.com/bid/16535 - Patch |
Information
Published : 2005-12-31 05:00
Updated : 2024-11-21 00:05
NVD link : CVE-2005-4816
Mitre link : CVE-2005-4816
CVE.ORG link : CVE-2005-4816
JSON object : View
Products Affected
proftpd_project
- proftpd
CWE