Package: linux-ftpd-ssl Severity: grave Tags: security Justification: user security hole
A remotely exploitable buffer overflow has been found in linux-ftpd-ssl. Please see http://seclists.org/lists/fulldisclosure/2005/Nov/0140.html for a PoC exploit. A proposed patch is available at http://seclists.org/lists/fulldisclosure/2005/Nov/0147.html This has been assigned CVE-2005-3524, please mention this in the changelog when fixing it. Cheers, Moritz -- System Information: Debian Release: testing/unstable APT prefers unstable APT policy: (500, 'unstable') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.14-1-686 Locale: LANG=C, [EMAIL PROTECTED] (charmap=ISO-8859-15) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]