Package: proftpd-dfsg
Version: 1.3.1-17lenny4
Severity: grave
Tags: security , patch

Hi,
the following CVE (Common Vulnerabilities & Exposures) id was
published for proftpd-dfsg.

CVE-2010-4221[0]:
| Multiple stack-based buffer overflows in the pr_netio_telnet_gets
| function in netio.c in ProFTPD before 1.3.3c allow remote attackers to
| execute arbitrary code via vectors involving a TELNET IAC escape
| character to a (1) FTP or (2) FTPS server.

Patch available:
http://bugs.proftpd.org/show_bug.cgi?id=3521

If you fix the vulnerability please also make sure to include the
CVE id in your changelog entry.

For further information see:

[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4221
    http://security-tracker.debian.org/tracker/CVE-2010-4221



-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to