CVE-2005-4816: Buffer overflow in mod_radius in ProFTPD

Related Vulnerabilities: CVE-2005-4816  

Debian Bug report logs - #404751
CVE-2005-4816: Buffer overflow in mod_radius in ProFTPD

version graph

Package: proftpd; Maintainer for proftpd is (unknown);

Reported by: Stefan Fritsch <sf@sfritsch.de>

Date: Wed, 27 Dec 2006 23:48:01 UTC

Severity: grave

Tags: security

Found in version 1.2.10-15sarge3

Fixed in version 1.3.10-1

Done: "Francesco P. Lovergine" <frankie@debian.org>

Bug is archived. No further changes may be made.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, Debian Security Team <team@security.debian.org>, Francesco Paolo Lovergine <frankie@debian.org>:
Bug#404751; Package proftpd. (full text, mbox, link).


Acknowledgement sent to Stefan Fritsch <sf@sfritsch.de>:
New Bug report received and forwarded. Copy sent to Debian Security Team <team@security.debian.org>, Francesco Paolo Lovergine <frankie@debian.org>. (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Stefan Fritsch <sf@sfritsch.de>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: CVE-2005-4816: Buffer overflow in mod_radius in ProFTPD
Date: Thu, 28 Dec 2006 00:37:24 +0100
Package: proftpd
Version: 1.2.10-15sarge3
Severity: grave
Tags: security
Justification: user security hole

According to 

http://www.securityfocus.com/bid/16535

the proftpd in sarge is still vulnerable to CVE-2005-4816:

Buffer overflow in mod_radius in ProFTPD before 1.3.0rc2 allows remote
attackers to cause a denial of service (crash) and possibly execute
arbitrary code via a long password.



Information forwarded to debian-bugs-dist@lists.debian.org, Francesco Paolo Lovergine <frankie@debian.org>:
Bug#404751; Package proftpd. (full text, mbox, link).


Acknowledgement sent to "Francesco P. Lovergine" <frankie@debian.org>:
Extra info received and forwarded to list. Copy sent to Francesco Paolo Lovergine <frankie@debian.org>. (full text, mbox, link).


Message #10 received at 404751@bugs.debian.org (full text, mbox, reply):

From: "Francesco P. Lovergine" <frankie@debian.org>
To: Stefan Fritsch <sf@sfritsch.de>, 404751@bugs.debian.org
Subject: Re: Bug#404751: CVE-2005-4816: Buffer overflow in mod_radius in ProFTPD
Date: Thu, 28 Dec 2006 09:25:11 +0100
tags 404751 + sarge
thanks

On Thu, Dec 28, 2006 at 12:37:24AM +0100, Stefan Fritsch wrote:
> Package: proftpd
> Version: 1.2.10-15sarge3
> Severity: grave
> Tags: security
> Justification: user security hole
> 
> According to 
> 
> http://www.securityfocus.com/bid/16535
> 
> the proftpd in sarge is still vulnerable to CVE-2005-4816:
> 
> Buffer overflow in mod_radius in ProFTPD before 1.3.0rc2 allows remote
> attackers to cause a denial of service (crash) and possibly execute
> arbitrary code via a long password.

-- 
Francesco P. Lovergine



Reply sent to "Francesco P. Lovergine" <frankie@debian.org>:
You have taken responsibility. (full text, mbox, link).


Notification sent to Stefan Fritsch <sf@sfritsch.de>:
Bug acknowledged by developer. (full text, mbox, link).


Message #15 received at 404751-done@bugs.debian.org (full text, mbox, reply):

From: "Francesco P. Lovergine" <frankie@debian.org>
To: Stefan Fritsch <sf@sfritsch.de>, 404751-done@bugs.debian.org
Subject: Re: Bug#404751: CVE-2005-4816: Buffer overflow in mod_radius in ProFTPD
Date: Thu, 28 Dec 2006 09:32:26 +0100
Package: proftpd
Version: 1.3.10-1

Solved in >= 1.3.0 

On Thu, Dec 28, 2006 at 12:37:24AM +0100, Stefan Fritsch wrote:
> Package: proftpd
> Version: 1.2.10-15sarge3
> Severity: grave
> Tags: security
> Justification: user security hole
> 
> According to 
> 
> http://www.securityfocus.com/bid/16535
> 
> the proftpd in sarge is still vulnerable to CVE-2005-4816:
> 
> Buffer overflow in mod_radius in ProFTPD before 1.3.0rc2 allows remote
> attackers to cause a denial of service (crash) and possibly execute
> arbitrary code via a long password.

-- 
Francesco P. Lovergine



Bug archived. Request was from Debbugs Internal Request <owner@bugs.debian.org> to internal_control@bugs.debian.org. (Mon, 25 Jun 2007 20:14:35 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Wed Jun 19 15:43:33 2019; Machine Name: buxtehude

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.