Francesco Paolo Lovergine
2010-Nov-03 10:02 UTC
[Secure-testing-team] Bug#602279: Buffer overflow in netio
Package: proftpd-dfsg Version: 1.3.3a-4 Severity: serious Tags: security See http://bugs.proftpd.org/show_bug.cgi?id=3521 This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of ProFTPD. Authentication is not required to exploit this vulnerability. Note that this does not apply to pre 1.3.2 series. -- System Information: Debian Release: squeeze/sid APT prefers unstable APT policy: (500, ''unstable''), (500, ''testing''), (1, ''experimental'') Architecture: i386 (i686) Kernel: Linux 2.6.32-5-686 (SMP w/1 CPU core) Locale: LANG=it_IT.UTF-8, LC_CTYPE=it_IT.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash