Описание
Buffer overflow in mod_radius in ProFTPD before 1.3.0rc2 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long password.
| Релиз | Статус | Примечание |
|---|---|---|
| dapper | ignored | end of life, was needed |
| devel | DNE | |
| edgy | ignored | end of life, was needed |
| feisty | DNE | |
| gutsy | DNE | |
| upstream | needs-triage |
Показывать по
10
| Релиз | Статус | Примечание |
|---|---|---|
| dapper | DNE | |
| devel | released | 1.2.10+1.3.0rc5-1 |
| edgy | DNE | |
| feisty | released | 1.2.10+1.3.0rc5-1 |
| gutsy | released | 1.2.10+1.3.0rc5-1 |
| upstream | needs-triage |
Показывать по
10
Ссылки на источники
EPSS
Процентиль: 86%
0.02842
Низкий
7.5 High
CVSS2
Связанные уязвимости
nvd
почти 20 лет назад
Buffer overflow in mod_radius in ProFTPD before 1.3.0rc2 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long password.
debian
почти 20 лет назад
Buffer overflow in mod_radius in ProFTPD before 1.3.0rc2 allows remote ...
github
больше 3 лет назад
Buffer overflow in mod_radius in ProFTPD before 1.3.0rc2 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long password.
EPSS
Процентиль: 86%
0.02842
Низкий
7.5 High
CVSS2