CVE-2010-4221

Multiple stack-based buffer overflows in the pr_netio_telnet_gets function in netio.c in ProFTPD before 1.3.3c allow remote attackers to execute arbitrary code via vectors involving a TELNET IAC escape character to a (1) FTP or (2) FTPS server.
References
Link Resource
http://bugs.proftpd.org/show_bug.cgi?id=3521 Exploit
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050687.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050703.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050726.html
http://secunia.com/advisories/42052 Vendor Advisory
http://secunia.com/advisories/42217
http://www.mandriva.com/security/advisories?name=MDVSA-2010:227
http://www.proftpd.org/docs/NEWS-1.3.3c
http://www.securityfocus.com/bid/44562 Exploit
http://www.vupen.com/english/advisories/2010/2941
http://www.vupen.com/english/advisories/2010/2959
http://www.vupen.com/english/advisories/2010/2962
http://www.zerodayinitiative.com/advisories/ZDI-10-229/
http://bugs.proftpd.org/show_bug.cgi?id=3521 Exploit
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050687.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050703.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050726.html
http://secunia.com/advisories/42052 Vendor Advisory
http://secunia.com/advisories/42217
http://www.mandriva.com/security/advisories?name=MDVSA-2010:227
http://www.proftpd.org/docs/NEWS-1.3.3c
http://www.securityfocus.com/bid/44562 Exploit
http://www.vupen.com/english/advisories/2010/2941
http://www.vupen.com/english/advisories/2010/2959
http://www.vupen.com/english/advisories/2010/2962
http://www.zerodayinitiative.com/advisories/ZDI-10-229/
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:proftpd:proftpd:1.3.2:*:*:*:*:*:*:*
cpe:2.3:a:proftpd:proftpd:1.3.2:a:*:*:*:*:*:*
cpe:2.3:a:proftpd:proftpd:1.3.2:b:*:*:*:*:*:*
cpe:2.3:a:proftpd:proftpd:1.3.2:c:*:*:*:*:*:*
cpe:2.3:a:proftpd:proftpd:1.3.2:d:*:*:*:*:*:*
cpe:2.3:a:proftpd:proftpd:1.3.2:e:*:*:*:*:*:*
cpe:2.3:a:proftpd:proftpd:1.3.2:rc3:*:*:*:*:*:*
cpe:2.3:a:proftpd:proftpd:1.3.2:rc4:*:*:*:*:*:*
cpe:2.3:a:proftpd:proftpd:1.3.3:*:*:*:*:*:*:*
cpe:2.3:a:proftpd:proftpd:1.3.3:a:*:*:*:*:*:*
cpe:2.3:a:proftpd:proftpd:1.3.3:b:*:*:*:*:*:*
cpe:2.3:a:proftpd:proftpd:1.3.3:rc1:*:*:*:*:*:*
cpe:2.3:a:proftpd:proftpd:1.3.3:rc2:*:*:*:*:*:*
cpe:2.3:a:proftpd:proftpd:1.3.3:rc3:*:*:*:*:*:*
cpe:2.3:a:proftpd:proftpd:1.3.3:rc4:*:*:*:*:*:*

History

21 Nov 2024, 01:20

Type Values Removed Values Added
References () http://bugs.proftpd.org/show_bug.cgi?id=3521 - Exploit () http://bugs.proftpd.org/show_bug.cgi?id=3521 - Exploit
References () http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050687.html - () http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050687.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050703.html - () http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050703.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050726.html - () http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050726.html -
References () http://secunia.com/advisories/42052 - Vendor Advisory () http://secunia.com/advisories/42052 - Vendor Advisory
References () http://secunia.com/advisories/42217 - () http://secunia.com/advisories/42217 -
References () http://www.mandriva.com/security/advisories?name=MDVSA-2010:227 - () http://www.mandriva.com/security/advisories?name=MDVSA-2010:227 -
References () http://www.proftpd.org/docs/NEWS-1.3.3c - () http://www.proftpd.org/docs/NEWS-1.3.3c -
References () http://www.securityfocus.com/bid/44562 - Exploit () http://www.securityfocus.com/bid/44562 - Exploit
References () http://www.vupen.com/english/advisories/2010/2941 - () http://www.vupen.com/english/advisories/2010/2941 -
References () http://www.vupen.com/english/advisories/2010/2959 - () http://www.vupen.com/english/advisories/2010/2959 -
References () http://www.vupen.com/english/advisories/2010/2962 - () http://www.vupen.com/english/advisories/2010/2962 -
References () http://www.zerodayinitiative.com/advisories/ZDI-10-229/ - () http://www.zerodayinitiative.com/advisories/ZDI-10-229/ -

Information

Published : 2010-11-09 21:00

Updated : 2024-11-21 01:20


NVD link : CVE-2010-4221

Mitre link : CVE-2010-4221

CVE.ORG link : CVE-2010-4221


JSON object : View

Products Affected

proftpd

  • proftpd
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer