Mandrake Linux Security Advisory : proftpd (MDKSA-2006:217-1)

This script is Copyright (C) 2007-2013 Tenable Network Security, Inc.

Synopsis :

The remote Mandrake Linux host is missing one or more security

Description :

A stack-based buffer overflow in the sreplace function in ProFTPD
1.3.0 and earlier, allows remote attackers to cause a denial of
service, as demonstrated by, a 'ProFTPD remote exploit.'

Buffer overflow in the tls_x509_name_oneline function in the mod_tls
module, as used in ProFTPD 1.3.0a and earlier, and possibly other
products, allows remote attackers to execute arbitrary code via a
large data length argument, a different vulnerability than
CVE-2006-5815. (CVE-2006-6170)

ProFTPD 1.3.0a and earlier does not properly set the buffer size limit
when CommandBufferSize is specified in the configuration file, which
leads to an off-by-two buffer underflow. NOTE: in November 2006, the
role of CommandBufferSize was originally associated with
CVE-2006-5815, but this was an error stemming from an initial vague
disclosure. NOTE: ProFTPD developers dispute this issue, saying that
the relevant memory location is overwritten by assignment before
further use within the affected function, so this is not a
vulnerability. (CVE-2006-6171)

Packages have been patched to correct these issues.

Update :

The previous update incorrectly linked the issue with the
CommandBufferSize issue. These are two distinct issues and the
previous update only addressed CommandBufferSize (CVE-2006-6171), and
the mod_tls issue (CVE-2006-6170).

Solution :

Update the affected packages.

Risk factor :

Critical / CVSS Base Score : 10.0
CVSS Temporal Score : 8.3
Public Exploit Available : true

Family: Mandriva Local Security Checks

Nessus Plugin ID: 24602 (mandrake_MDKSA-2006-217.nasl)

Bugtraq ID: 20992

CVE ID: CVE-2006-5815

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now