Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-gf2w-q84f-pmmw

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Multiple stack-based buffer overflows in the pr_netio_telnet_gets function in netio.c in ProFTPD before 1.3.3c allow remote attackers to execute arbitrary code via vectors involving a TELNET IAC escape character to a (1) FTP or (2) FTPS server.

Multiple stack-based buffer overflows in the pr_netio_telnet_gets function in netio.c in ProFTPD before 1.3.3c allow remote attackers to execute arbitrary code via vectors involving a TELNET IAC escape character to a (1) FTP or (2) FTPS server.

EPSS

Процентиль: 100%
0.90946
Критический

Дефекты

CWE-119

Связанные уязвимости

ubuntu
около 15 лет назад

Multiple stack-based buffer overflows in the pr_netio_telnet_gets function in netio.c in ProFTPD before 1.3.3c allow remote attackers to execute arbitrary code via vectors involving a TELNET IAC escape character to a (1) FTP or (2) FTPS server.

nvd
около 15 лет назад

Multiple stack-based buffer overflows in the pr_netio_telnet_gets function in netio.c in ProFTPD before 1.3.3c allow remote attackers to execute arbitrary code via vectors involving a TELNET IAC escape character to a (1) FTP or (2) FTPS server.

debian
около 15 лет назад

Multiple stack-based buffer overflows in the pr_netio_telnet_gets func ...

EPSS

Процентиль: 100%
0.90946
Критический

Дефекты

CWE-119