what you don't know can hurt you

Debian Security Advisory 4559-1

Debian Security Advisory 4559-1
Posted Nov 6, 2019
Authored by Debian | Site debian.org

Debian Linux Security Advisory 4559-1 - Stephan Zeisberg discovered that missing input validation in ProFTPD, a FTP/SFTP/FTPS server, could result in denial of service via an infinite loop.

tags | advisory, denial of service
systems | linux, debian
advisories | CVE-2019-18217
MD5 | 0593df4978da5dc1e51ff3e39f464d16

Debian Security Advisory 4559-1

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4559-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
November 05, 2019 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : proftpd-dfsg
CVE ID : CVE-2019-18217
Debian Bug : 942831

Stephan Zeisberg discovered that missing input validation in ProFTPD, a
FTP/SFTP/FTPS server, could result in denial of service via an infinite
loop.

For the oldstable distribution (stretch), this problem has been fixed
in version 1.3.5b-4+deb9u2.

For the stable distribution (buster), this problem has been fixed in
version 1.3.6-4+deb10u2.

We recommend that you upgrade your proftpd-dfsg packages.

For the detailed security status of proftpd-dfsg please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/proftpd-dfsg

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
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√ĚpD
-----END PGP SIGNATURE-----

Comments

RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

File Archive:

February 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Feb 1st
    1 Files
  • 2
    Feb 2nd
    2 Files
  • 3
    Feb 3rd
    17 Files
  • 4
    Feb 4th
    15 Files
  • 5
    Feb 5th
    24 Files
  • 6
    Feb 6th
    16 Files
  • 7
    Feb 7th
    19 Files
  • 8
    Feb 8th
    1 Files
  • 9
    Feb 9th
    2 Files
  • 10
    Feb 10th
    15 Files
  • 11
    Feb 11th
    20 Files
  • 12
    Feb 12th
    12 Files
  • 13
    Feb 13th
    18 Files
  • 14
    Feb 14th
    17 Files
  • 15
    Feb 15th
    4 Files
  • 16
    Feb 16th
    4 Files
  • 17
    Feb 17th
    34 Files
  • 18
    Feb 18th
    15 Files
  • 19
    Feb 19th
    19 Files
  • 20
    Feb 20th
    20 Files
  • 21
    Feb 21st
    15 Files
  • 22
    Feb 22nd
    2 Files
  • 23
    Feb 23rd
    2 Files
  • 24
    Feb 24th
    16 Files
  • 25
    Feb 25th
    37 Files
  • 26
    Feb 26th
    15 Files
  • 27
    Feb 27th
    15 Files
  • 28
    Feb 28th
    4 Files
  • 29
    Feb 29th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close