Use-after-free vulnerability in the Response API in ProFTPD before 1.3.3g allows remote authenticated users to execute arbitrary code via vectors involving an error that occurs after an FTP data transfer.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:31
Type | Values Removed | Values Added |
---|---|---|
References | () http://bugs.proftpd.org/show_bug.cgi?id=3711 - Exploit, Patch | |
References | () http://www.proftpd.org/docs/NEWS-1.3.3g - | |
References | () http://www.securityfocus.com/bid/50631 - | |
References | () http://www.zerodayinitiative.com/advisories/ZDI-11-328/ - |
Information
Published : 2011-12-06 11:55
Updated : 2024-11-21 01:31
NVD link : CVE-2011-4130
Mitre link : CVE-2011-4130
CVE.ORG link : CVE-2011-4130
JSON object : View
Products Affected
proftpd
- proftpd
CWE
CWE-399
Resource Management Errors