Описание
Stack-based buffer overflow in the pr_ctrls_recv_request function in ctrls.c in the mod_ctrls module in ProFTPD before 1.3.1rc1 allows local users to execute arbitrary code via a large reqarglen length value.
Ссылки
- ExploitPatchVendor Advisory
- ExploitPatch
- ExploitPatch
- ExploitPatchVendor Advisory
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:proftpd_project:proftpd:1.3.0:*:*:*:*:*:*:*
cpe:2.3:a:proftpd_project:proftpd:1.3.0a:*:*:*:*:*:*:*
EPSS
Процентиль: 40%
0.00177
Низкий
6.6 Medium
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
ubuntu
больше 18 лет назад
Stack-based buffer overflow in the pr_ctrls_recv_request function in ctrls.c in the mod_ctrls module in ProFTPD before 1.3.1rc1 allows local users to execute arbitrary code via a large reqarglen length value.
debian
больше 18 лет назад
Stack-based buffer overflow in the pr_ctrls_recv_request function in c ...
github
больше 3 лет назад
Stack-based buffer overflow in the pr_ctrls_recv_request function in ctrls.c in the mod_ctrls module in ProFTPD before 1.3.1rc1 allows local users to execute arbitrary code via a large reqarglen length value.
EPSS
Процентиль: 40%
0.00177
Низкий
6.6 Medium
CVSS2
Дефекты
NVD-CWE-Other