Heap-based buffer overflow in the sql_prepare_where function (contrib/mod_sql.c) in ProFTPD prior to 1.3.3d, when mod_sql is enabled, allows remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code via a crafted username containing substitution tags, which are not properly handled during construction of an SQL query.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
proftpd proftpd 1.3.1 |
||
proftpd proftpd 1.3.0 |
||
proftpd proftpd 1.2.10 |
||
proftpd proftpd 1.3.3 |
||
proftpd proftpd 1.2.4 |
||
proftpd proftpd 1.2.3 |
||
proftpd proftpd 1.2.0 |
||
proftpd proftpd 1.2.8 |
||
proftpd proftpd 1.2.6 |
||
proftpd proftpd 1.3.2 |
||
proftpd proftpd 1.2.2 |
||
proftpd proftpd 1.2.1 |
||
proftpd proftpd 1.2.9 |
||
proftpd proftpd 1.2.7 |
||
proftpd proftpd 1.2.5 |
||
proftpd proftpd |