Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2006-6563

Опубликовано: 15 дек. 2006
Источник: debian
EPSS Низкий

Описание

Stack-based buffer overflow in the pr_ctrls_recv_request function in ctrls.c in the mod_ctrls module in ProFTPD before 1.3.1rc1 allows local users to execute arbitrary code via a large reqarglen length value.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
proftpd-dfsgfixed1.3.0-17package
proftpdnot-affectedsargepackage

EPSS

Процентиль: 45%
0.00247
Низкий

Связанные уязвимости

ubuntu
почти 19 лет назад

Stack-based buffer overflow in the pr_ctrls_recv_request function in ctrls.c in the mod_ctrls module in ProFTPD before 1.3.1rc1 allows local users to execute arbitrary code via a large reqarglen length value.

nvd
почти 19 лет назад

Stack-based buffer overflow in the pr_ctrls_recv_request function in ctrls.c in the mod_ctrls module in ProFTPD before 1.3.1rc1 allows local users to execute arbitrary code via a large reqarglen length value.

github
больше 3 лет назад

Stack-based buffer overflow in the pr_ctrls_recv_request function in ctrls.c in the mod_ctrls module in ProFTPD before 1.3.1rc1 allows local users to execute arbitrary code via a large reqarglen length value.

EPSS

Процентиль: 45%
0.00247
Низкий