[bug-notifications] [proftpd 0001946]: CVE-2006-5815: remote code execution in ProFTPD

Mantis Bug Tracker noreply at opencsw.org
Sun Oct 24 11:35:03 CEST 2010


The following issue has been RESOLVED. 
====================================================================== 
https://www.opencsw.org/mantis/view.php?id=1946 
====================================================================== 
Reported By:                blindpassenger
Assigned To:                ai
====================================================================== 
Project:                    proftpd
Issue ID:                   1946
Category:                   upgrade
Reproducibility:            always
Severity:                   major
Priority:                   normal
Status:                     resolved
Resolution:                 fixed
Fixed in Version:           
====================================================================== 
Date Submitted:             2006-11-28 05:47 CET
Last Modified:              2010-10-24 11:35 CEST
====================================================================== 
Summary:                    CVE-2006-5815: remote code execution in ProFTPD
Description: 
Copied from www.proftpd.org:

On 6 November 2006, Evgeny Legerov <admin at gleg.net> posted to BUGTRAQ[1],
announcing his commercial VulnDisco Pack for Metasploit 2.7[2]. One of
the
included exploits, vd_proftpd.pm, takes advantage of an off-by-one string
manipulation flaw in ProFTPD\'s sreplace() function to allow a remote
attacker to execute arbitrary code.

This vulnerabillity, identified as CVE-2006-5815[3], is believed to
affect
all versions of ProFTPD up to and including 1.3.0, but exploitability has
only been demonstrated with version 1.3.0rc3. The demonstrated exploit
relies on write access via FTP for exploitability, but other attack
vectors
may make exploitation of a read-only FTP server possible.

This vulnerability has been patched[4] in the latest release of ProFTPD,
1.3.0a, which is available from the ProFTPD web site,
http://www.proftpd.org/. Mitigation
techniques have also been developed for
use until a patched version can be installed.
====================================================================== 

---------------------------------------------------------------------- 
 (0008394) ai (manager) - 2010-10-24 11:35
 https://www.opencsw.org/mantis/view.php?id=1946#c8394 
---------------------------------------------------------------------- 
1.3.3b



More information about the bug-notifications mailing list