what you don't know can hurt you
Showing 1 - 25 of 100 RSS Feed

Files

ProFTPD 1.3.7a Denial Of Service
Posted Mar 22, 2021
Authored by xynmaps

ProFTPD version 1.3.7a suffers from a denial of service vulnerability.

tags | exploit, denial of service
MD5 | 24275c487afa97667075812d6974cad5

Related Files

Slackware Security Advisory - proftpd Updates
Posted Feb 14, 2012
Authored by Slackware Security Team | Site slackware.com

Slackware Security Advisory - New proftpd packages are available for Slackware 11.0, 12.0, 12.1, 12.2, 13.0, 13.1, 13.37, and -current to fix security issues.

tags | advisory
systems | linux, slackware
advisories | CVE-2011-4130
MD5 | ca1b4eddc7e6a4059c5ddade7490ffc9
Secunia Security Advisory 48017
Posted Feb 13, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Slackware has issued an update for proftpd. This fixes a vulnerability, which can be exploited by malicious users to compromise a vulnerable system.

tags | advisory
systems | linux, slackware
MD5 | 9e66a526b0a88175a9846e64e1c19a14
Mandriva Linux Security Advisory 2011-181
Posted Dec 8, 2011
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2011-181 - Use-after-free vulnerability in the Response API in ProFTPD before 1.3.3g allows remote authenticated users to execute arbitrary code via vectors involving an error that occurs after an FTP data transfer. The updated packages have been upgraded to the latest version 1.3.3g which is not vulnerable to this issue.

tags | advisory, remote, arbitrary
systems | linux, mandriva
advisories | CVE-2011-4130
MD5 | a8b86593c1e6f72dc94c32454b7bfcf6
ProFTPd / FreeBSD ftpd Remote Root
Posted Nov 30, 2011
Authored by Kingcope

Remote root exploit for FreeBSD ftpd and ProFTPd on FreeBSD. It leverages the fact that /etc and /lib can be modified inside of the chroot.

tags | exploit, remote, root
systems | freebsd
MD5 | 2afb95522b810b098c941ae9c312a402
Secunia Security Advisory 46965
Posted Nov 21, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for proftpd. This fixes a vulnerability, which can be exploited by malicious users to compromise a vulnerable system.

tags | advisory
systems | linux, fedora
MD5 | fa8aeadd90d2e6b03ef68fd9282a9413
Debian Security Advisory 2346-2
Posted Nov 17, 2011
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2346-2 - The ProFTPD security update, DSA-2346-1, introduced a regression, preventing successful TLS connections. This regression does not affected the stable distribution (squeeze), nor the testing and unstable distributions.

tags | advisory
systems | linux, debian
MD5 | 1f98968f77bcc8a72e680dfffd64f5ef
Debian Security Advisory 2346-1
Posted Nov 16, 2011
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2346-1 - Several vulnerabilities were discovered in ProFTPD, an FTP server. ProFTPD incorrectly uses data from an unencrypted input buffer after encryption has been enabled with STARTTLS, an issue similar to CVE-2011-0411. ProFTPD uses a response pool after freeing it under exceptional conditions, possibly leading to remote code execution.

tags | advisory, remote, vulnerability, code execution
systems | linux, debian
advisories | CVE-2011-0411, CVE-2011-4130
MD5 | 09e47c9f54c850e4c553afe33bc30cec
Zero Day Initiative Advisory 11-328
Posted Nov 12, 2011
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 11-328 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of the ProFTPd server. Authentication is required to exploit this vulnerability in order to have access to the ftp command set. The specific flaw exists within how the server manages the response pool that is used to send responses from the server to the client. When handling an exceptional condition the application will fail to restore the original response pointer which will allow there to be more than one reference to the response pointer. The next time it is used, a memory corruption can be made to occur which can allow for code execution under the context of the application.

tags | advisory, remote, arbitrary, code execution
MD5 | 098867ab5a4a7b457e0798e9974fd916
Secunia Security Advisory 46811
Posted Nov 10, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in ProFTPD, which can be exploited by malicious users to compromise a vulnerable system.

tags | advisory
MD5 | 4bf98cad00881d44a7ba2ba0f5cad24b
Secunia Security Advisory 44240
Posted Apr 18, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for proftpd. This fixes two vulnerabilities, which can be exploited by malicious people to manipulate certain data and cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
systems | linux, fedora
MD5 | 08343dd8a6d1e355b30d69884831ccfb
Secunia Security Advisory 43978
Posted Apr 5, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Slackware has issued an update for proftpd. This fixes two vulnerabilities, which can be exploited by malicious people to manipulate certain data and cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
systems | linux, slackware
MD5 | 35347d57ce2643277118f8a49e1bd985
Mandriva Linux Security Advisory 2011-047
Posted Mar 18, 2011
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2011-047 - Integer overflow in the mod_sftp module in ProFTPD 1.3.3d and earlier allows remote attackers to cause a denial of service via a malformed SSH message. Additionally for Mandriva Linux 2010.0 proftpd was upgraded to the same version as in Mandriva Linux 2010.2. The updated packages have been patched to correct this issue.

tags | advisory, remote, denial of service, overflow
systems | linux, mandriva
advisories | CVE-2011-1137
MD5 | 6622a71f83b464af1716ec1090fc19aa
Secunia Security Advisory 43726
Posted Mar 15, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for proftpd-dfsg. This fixes a vulnerability, which can be exploited by malicious users to manipulate certain data.

tags | advisory
systems | linux, debian
MD5 | ee6e12a445b71c44ebde84590c85c8f8
Debian Security Advisory 2191-1
Posted Mar 15, 2011
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2191-1 - Several vulnerabilities have been discovered in ProFTPD, a versatile, virtual-hosting FTP daemon:

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2008-7265, CVE-2010-3867, CVE-2010-4652
MD5 | 65703c2d3667b48ef0edf5cd70fe448c
Debian Security Advisory 2185-1
Posted Mar 9, 2011
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2185-1 - It was discovered that an integer overflow in the SFTP file transfer module of the ProFTPD daemon could lead to denial of service.

tags | advisory, denial of service, overflow
systems | linux, debian
advisories | CVE-2011-1137
MD5 | 0494d11e5d5bac1164a1763c2106706c
Secunia Security Advisory 43635
Posted Mar 9, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for proftpd-dfsg. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | linux, debian
MD5 | 575eda54937b3246330973bec1fae3b8
NetSupport Manager Agent Remote Buffer Overflow
Posted Mar 4, 2011
Authored by Luca Carettoni, jduck, Evan | Site metasploit.com

This Metasploit module exploits a buffer overflow in NetSupport Manager Agent. It uses a similar ROP to the proftpd_iac exploit in order to avoid non executable stack.

tags | exploit, overflow
advisories | CVE-2011-0404, OSVDB-70408
MD5 | ff7526b15030b7a9994759fdfc8bdc84
Mandriva Linux Security Advisory 2011-023
Posted Feb 8, 2011
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2011-023 - Heap-based buffer overflow in the sql_prepare_where function in ProFTPD before 1.3.3d, when mod_sql is enabled, allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted username containing substitution tags, which are not properly handled during construction of an SQL query.

tags | advisory, remote, denial of service, overflow, arbitrary
systems | linux, mandriva
advisories | CVE-2010-4652
MD5 | 9b37d9175cff894cff118a1b545dd4bc
Secunia Security Advisory 43234
Posted Feb 8, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in ProFTPD, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
MD5 | 860d4a99d52936888eeddb942f87bfbb
ProFTPD mod_sftp Integer Overflow
Posted Feb 7, 2011
Authored by Kingcope

ProFTPD mod_sftp integer overflow denial of service proof of concept exploit.

tags | exploit, denial of service, overflow, proof of concept
MD5 | c778686578bc4f6e7faa9121b90b537e
ProFTPD 1.2 - 1.3.0 sreplace Buffer Overflow (Linux)
Posted Jan 10, 2011
Authored by Evgeny Legerov, jduck | Site metasploit.com

This Metasploit module exploits a stack-based buffer overflow in versions 1.2 through 1.3.0 of ProFTPD server. The vulnerability is within the "sreplace" function within the "src/support.c" file. The off-by-one heap overflow bug in the ProFTPD sreplace function has been discovered about 2 (two) years ago by Evgeny Legerov.

tags | exploit, overflow
advisories | CVE-2006-5815, OSVDB-68985
MD5 | f9ad34f235cbf81d538726995267414a
GNU libc/regcomp(3) Overflow / Stack Exhaustion
Posted Jan 7, 2011
Authored by Maksymilian Arciemowicz

GNU libc/regcomp(3) suffers from overflow and stack exhaustion vulnerabilities. proftpd.gnu.c exploit included.

tags | exploit, overflow, vulnerability
systems | linux
advisories | CVE-2010-4051, CVE-2010-4052
MD5 | 88d2dbbe0c27bfc6f7058b21f380df82
Secunia Security Advisory 42449
Posted Dec 3, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in ProFTPD, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
MD5 | e3b8fac359d42367e1cfe6407742accb
ProFTPD 1.3.3c Trojan Source Code
Posted Dec 3, 2010

ProFTPD version 1.3.3c compromised source remote root trojan code.

tags | exploit, remote, root, trojan
MD5 | 792c8074796b7beeadea6b6cf2fae8c7
ProFTPD-1.3.3c Backdoor Command Execution
Posted Dec 3, 2010
Authored by MC, darkharper2 | Site metasploit.com

This Metasploit module exploits a malicious backdoor that was added to the ProFTPD download archive. This backdoor was present in the proftpd-1.3.3c.tar.[bz2|gz] archive between November 28th 2010 and 2nd December 2010.

tags | exploit
MD5 | d21e4905629c6bbe53f36454070c1661
Page 1 of 4
Back1234Next

File Archive:

May 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    1 Files
  • 2
    May 2nd
    4 Files
  • 3
    May 3rd
    27 Files
  • 4
    May 4th
    17 Files
  • 5
    May 5th
    3 Files
  • 6
    May 6th
    32 Files
  • 7
    May 7th
    11 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    0 Files
  • 10
    May 10th
    0 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close