Upstream information

CVE-2006-5815 at MITRE

Description

Stack-based buffer overflow in the sreplace function in ProFTPD 1.3.0 and earlier allows remote attackers, probably authenticated, to cause a denial of service and execute arbitrary code, as demonstrated by vd_proftpd.pm, a "ProFTPD remote exploit."

SUSE information

Overall state of this security issue: Does not affect SUSE products

This issue is currently rated as having critical severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 10
Vector AV:N/AC:L/Au:N/C:C/I:C/A:C
Access Vector Network
Access Complexity Low
Authentication None
Confidentiality Impact Complete
Integrity Impact Complete
Availability Impact Complete
No SUSE Bugzilla entries cross referenced.

No SUSE Security Announcements cross referenced.

List of released packages

Product(s) Fixed package version(s) References
openSUSE Tumbleweed
  • proftpd >= 1.3.6e-1.10
  • proftpd-devel >= 1.3.6e-1.10
  • proftpd-doc >= 1.3.6e-1.10
  • proftpd-lang >= 1.3.6e-1.10
  • proftpd-ldap >= 1.3.6e-1.10
  • proftpd-mysql >= 1.3.6e-1.10
  • proftpd-pgsql >= 1.3.6e-1.10
  • proftpd-radius >= 1.3.6e-1.10
  • proftpd-sqlite >= 1.3.6e-1.10
Patchnames:
openSUSE Tumbleweed GA proftpd-1.3.6e-1.10


SUSE Timeline for this CVE

CVE page created: Fri Jun 28 05:16:44 2013
CVE page last modified: Fri Oct 7 12:45:35 2022