Description: | Description: The remote host is missing an update to proftpd announced via advisory FEDORA-2011-0610.
Update Information:
This is an update to the current upstream maintenance release, which addresses a security issue that could affect users of the mod_sql module (not enabled by default).
* A heap-based buffer overflow flaw was found in the way ProFTPD FTP server prepared SQL queries for certain usernames, when the mod_sql module was enabled. A remote, unauthenticated attacker could use this flaw to cause the proftpd daemon to crash or, potentially, to execute arbitrary code with the privileges of the user running 'proftpd' via a specially-crafted username, provided in the authentication dialog.
The update also fixes a CPU spike when handling .ftpaccess files, and handling of SFTP uploads when compression is used.
References:
[ 1 ] Bug #670170 - CVE-2010-4652 ProFTPD (mod_sql): Heap-based buffer overflow by processing certain usernames, when mod_sql module enabled https://bugzilla.redhat.com/show_bug.cgi?id=670170
Solution: Apply the appropriate updates.
This update can be installed with the yum update program. Use su -c 'yum update proftpd' at the command line. For more information, refer to Managing Software with yum, available at http://docs.fedoraproject.org/yum/.
http://www.securityspace.com/smysecure/catid.html?in=FEDORA-2011-0610
Risk factor : Critical
CVSS Score: 10.0
|