Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2006-6563

Опубликовано: 15 дек. 2006
Источник: debian
EPSS Низкий

Описание

Stack-based buffer overflow in the pr_ctrls_recv_request function in ctrls.c in the mod_ctrls module in ProFTPD before 1.3.1rc1 allows local users to execute arbitrary code via a large reqarglen length value.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
proftpd-dfsgfixed1.3.0-17package
proftpdnot-affectedsargepackage

EPSS

Процентиль: 40%
0.00177
Низкий

Связанные уязвимости

ubuntu
больше 18 лет назад

Stack-based buffer overflow in the pr_ctrls_recv_request function in ctrls.c in the mod_ctrls module in ProFTPD before 1.3.1rc1 allows local users to execute arbitrary code via a large reqarglen length value.

nvd
больше 18 лет назад

Stack-based buffer overflow in the pr_ctrls_recv_request function in ctrls.c in the mod_ctrls module in ProFTPD before 1.3.1rc1 allows local users to execute arbitrary code via a large reqarglen length value.

github
больше 3 лет назад

Stack-based buffer overflow in the pr_ctrls_recv_request function in ctrls.c in the mod_ctrls module in ProFTPD before 1.3.1rc1 allows local users to execute arbitrary code via a large reqarglen length value.

EPSS

Процентиль: 40%
0.00177
Низкий