|Category:||Mandrake Local Security Checks|
|Title:||Mandriva Security Advisory MDVSA-2011:023 (proftpd)|
|Summary:||Mandriva Security Advisory MDVSA-2011:023 (proftpd)|
The remote host is missing an update to proftpd
announced via advisory MDVSA-2011:023.
A vulnerability has been found and corrected in proftpd:
Heap-based buffer overflow in the sql_prepare_where function
(contrib/mod_sql.c) in ProFTPD before 1.3.3d, when mod_sql is enabled,
allows remote attackers to cause a denial of service (crash) and
possibly execute arbitrary code via a crafted username containing
substitution tags, which are not properly handled during construction
of an SQL query (CVE-2010-4652).
Packages for 2009.0 are provided as of the Extended Maintenance
Program. Please visit this link to learn more:
The updated packages have been patched to correct this issue.
Affected: 2009.0, 2010.0, 2010.1, Enterprise Server 5.0
To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
Risk factor : High
Common Vulnerability Exposure (CVE) ID: CVE-2010-4652|
Debian Security Information: DSA-2191 (Google Search)
BugTraq ID: 44933
|Copyright||Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com|
|This is only one of 50192 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.