Summary:
- “TAG_LOG_PKT
Impact:
- Confidentiality Impact: COMPLETE Integrity Impact: COMPLETE Availability Impact: COMPLETE
Detailed Information:
- Multiple stack-based buffer overflows in the pr_netio_telnet_gets function in netio.c in ProFTPD before 1.3.3c allow remote attackers to execute arbitrary code via vectors involving a TELNET IAC escape character to a (1) FTP or (2) FTPS server.
Affected Systems:
- proftpd proftpd 1.3.2
proftpd proftpd 1.3.3
proftpd proftpd 1.3.2 d
proftpd proftpd 1.3.2 b
proftpd proftpd 1.3.2 rc3
proftpd proftpd 1.3.2 e
proftpd proftpd 1.3.2 rc4
proftpd proftpd 1.3.3 rc3
proftpd proftpd 1.3.2 c
proftpd proftpd 1.3.3 rc4
proftpd proftpd 1.3.3 b
proftpd proftpd 1.3.3 rc1
proftpd proftpd 1.3.3 a
proftpd proftpd 1.3.2 a
proftpd proftpd 1.3.3 rc2
Attack Scenarios:
- No data available
False Positives:
- None known
False Negatives:
- None known
Corrective Action:
- Upgrade to the latest non-affected version
Apply vendor-provided patches
Contributors:
- No data available
Additional References:
* 2009-1535 ###ms09-020 http://www.microsoft.com/technet/security/bulletin/ms09-020.mspx
* http://docs.idsresearch.org/http_ids_evasions.pdf
* 2005-0560 ###ms05-021 http://www.microsoft.com/technet/security/bulletin/ms05-021.mspx
* MS11-004
* 2002-0640 ###ms04-011 http://technet.microsoft.com/en-us/security/bulletin/ms04-011