|Category:||Mandrake Local Security Checks|
|Title:||Mandrake Security Advisory MDKSA-2006:217 (proftpd)|
|Summary:||Mandrake Security Advisory MDKSA-2006:217 (proftpd)|
The remote host is missing an update to proftpd
announced via advisory MDKSA-2006:217.
As disclosed by an exploit (vd_proftpd.pm) and a related vendor bugfix,
a Denial of Service (DoS) vulnerability exists in the FTP server
ProFTPD, up to and including version 1.3.0. The flaw is due to both a
potential bus error and a definitive buffer overflow in the code which
determines the FTP command buffer size limit. The vulnerability can be
exploited only if the CommandBufferSize directive is explicitly used
in the server configuration, which is not the case in the default
configuration of ProFTPD.
Packages have been patched to correct these issues.
Affected: 2006.0, 2007.0, Corporate 3.0, Corporate 4.0
To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
Risk factor : Critical
Common Vulnerability Exposure (CVE) ID: CVE-2006-5815|
Bugtraq: 20061127 CVE-2006-5815: remote code execution in ProFTPD (Google Search)
Debian Security Information: DSA-1222 (Google Search)
BugTraq ID: 20992
XForce ISS Database: proftpd-code-execution(30147)
|Copyright||Copyright (c) 2006 E-Soft Inc. http://www.securityspace.com|
|This is only one of 47234 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.