exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 100 RSS Feed

Files

pr0ftpd_modctrls.tgz
Posted Apr 17, 2007
Authored by Xpl017Elz | Site inetcop.org

ProFTPD versions 1.3.0 and 1.3.0a local overflow exploit.

tags | exploit, overflow, local
SHA-256 | f226fa4b69a0b38b89856b6fdf13dd0cae57a2c097428ced1cb703ee6948d130

Related Files

Slackware Security Advisory - proftpd Updates
Posted Feb 14, 2012
Authored by Slackware Security Team | Site slackware.com

Slackware Security Advisory - New proftpd packages are available for Slackware 11.0, 12.0, 12.1, 12.2, 13.0, 13.1, 13.37, and -current to fix security issues.

tags | advisory
systems | linux, slackware
advisories | CVE-2011-4130
SHA-256 | cb63893e652e4b1ac3596a93b9ec8e823b155a7fe7c1cc34c0271f992a73ef6e
Secunia Security Advisory 48017
Posted Feb 13, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Slackware has issued an update for proftpd. This fixes a vulnerability, which can be exploited by malicious users to compromise a vulnerable system.

tags | advisory
systems | linux, slackware
SHA-256 | 2062bfa78e01243a6c31d7ec38b41d1fe4a26ee30426eaff54f6901a2a10459c
Mandriva Linux Security Advisory 2011-181
Posted Dec 8, 2011
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2011-181 - Use-after-free vulnerability in the Response API in ProFTPD before 1.3.3g allows remote authenticated users to execute arbitrary code via vectors involving an error that occurs after an FTP data transfer. The updated packages have been upgraded to the latest version 1.3.3g which is not vulnerable to this issue.

tags | advisory, remote, arbitrary
systems | linux, mandriva
advisories | CVE-2011-4130
SHA-256 | 0be1d40f8f3b58111ad1f44517b3cd8c334da98ee590aaee94305394e4d7a9d6
ProFTPd / FreeBSD ftpd Remote Root
Posted Nov 30, 2011
Authored by Kingcope

Remote root exploit for FreeBSD ftpd and ProFTPd on FreeBSD. It leverages the fact that /etc and /lib can be modified inside of the chroot.

tags | exploit, remote, root
systems | freebsd
SHA-256 | f59b24d7a9bf8446fb65b25ad7046e1b91fd2198e39bf16f0a7f6d2431d9e848
Secunia Security Advisory 46965
Posted Nov 21, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for proftpd. This fixes a vulnerability, which can be exploited by malicious users to compromise a vulnerable system.

tags | advisory
systems | linux, fedora
SHA-256 | 10ab32a5c57a489e183ce7c8a4d53cea3512dd690e43742943bcd1f5175bff91
Debian Security Advisory 2346-2
Posted Nov 17, 2011
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2346-2 - The ProFTPD security update, DSA-2346-1, introduced a regression, preventing successful TLS connections. This regression does not affected the stable distribution (squeeze), nor the testing and unstable distributions.

tags | advisory
systems | linux, debian
SHA-256 | 2c741817b56678426ef6c637f2e3574cb0c40b669b506fd3585c4f936cddb790
Debian Security Advisory 2346-1
Posted Nov 16, 2011
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2346-1 - Several vulnerabilities were discovered in ProFTPD, an FTP server. ProFTPD incorrectly uses data from an unencrypted input buffer after encryption has been enabled with STARTTLS, an issue similar to CVE-2011-0411. ProFTPD uses a response pool after freeing it under exceptional conditions, possibly leading to remote code execution.

tags | advisory, remote, vulnerability, code execution
systems | linux, debian
advisories | CVE-2011-0411, CVE-2011-4130
SHA-256 | 4e0fcf4b058513cde8c483fad69e28ac40ae4aa41d60b8770ad1d405582c34f3
Zero Day Initiative Advisory 11-328
Posted Nov 12, 2011
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 11-328 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of the ProFTPd server. Authentication is required to exploit this vulnerability in order to have access to the ftp command set. The specific flaw exists within how the server manages the response pool that is used to send responses from the server to the client. When handling an exceptional condition the application will fail to restore the original response pointer which will allow there to be more than one reference to the response pointer. The next time it is used, a memory corruption can be made to occur which can allow for code execution under the context of the application.

tags | advisory, remote, arbitrary, code execution
SHA-256 | b042b6cfefe59bf1569e922d7012f959d2ae5e85844b6ddcc1fa014ac415dd41
Secunia Security Advisory 46811
Posted Nov 10, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in ProFTPD, which can be exploited by malicious users to compromise a vulnerable system.

tags | advisory
SHA-256 | d08578332dc908ec94ae8dd945dd9239f4e2e3836515779c4f42ba5a9d3d4feb
Secunia Security Advisory 44240
Posted Apr 18, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for proftpd. This fixes two vulnerabilities, which can be exploited by malicious people to manipulate certain data and cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
systems | linux, fedora
SHA-256 | ccafd038dcde1e733e4b0fe7bb2f1aa78dc535b69cc46dc88c1e7b292d77d091
Secunia Security Advisory 43978
Posted Apr 5, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Slackware has issued an update for proftpd. This fixes two vulnerabilities, which can be exploited by malicious people to manipulate certain data and cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
systems | linux, slackware
SHA-256 | eb3ba92d9d30cc61f96c5977a4790ef022e17c117f93a2f500648e3a5bae0a1e
Mandriva Linux Security Advisory 2011-047
Posted Mar 18, 2011
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2011-047 - Integer overflow in the mod_sftp module in ProFTPD 1.3.3d and earlier allows remote attackers to cause a denial of service via a malformed SSH message. Additionally for Mandriva Linux 2010.0 proftpd was upgraded to the same version as in Mandriva Linux 2010.2. The updated packages have been patched to correct this issue.

tags | advisory, remote, denial of service, overflow
systems | linux, mandriva
advisories | CVE-2011-1137
SHA-256 | 9505eefd8186096410330ca5fefa718efaedacf8687774ced3b4c91df99ea711
Secunia Security Advisory 43726
Posted Mar 15, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for proftpd-dfsg. This fixes a vulnerability, which can be exploited by malicious users to manipulate certain data.

tags | advisory
systems | linux, debian
SHA-256 | 94427441774f8e8c621ff598b3958f7b5622b90a1a4901a6453dd1e535bfb65b
Debian Security Advisory 2191-1
Posted Mar 15, 2011
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2191-1 - Several vulnerabilities have been discovered in ProFTPD, a versatile, virtual-hosting FTP daemon:

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2008-7265, CVE-2010-3867, CVE-2010-4652
SHA-256 | a3daaaafb4a782de07eeee7e0736d4db06721550e084937ec6b1b4e25601c428
Debian Security Advisory 2185-1
Posted Mar 9, 2011
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2185-1 - It was discovered that an integer overflow in the SFTP file transfer module of the ProFTPD daemon could lead to denial of service.

tags | advisory, denial of service, overflow
systems | linux, debian
advisories | CVE-2011-1137
SHA-256 | 8c0a9460615a79f2a39af6deb02e7ddb72b3c39bf9a721e9f487b650ee90953a
Secunia Security Advisory 43635
Posted Mar 9, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for proftpd-dfsg. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | linux, debian
SHA-256 | f9c8265729d99170d7a9bec21f67ac1709a9aeaae300bbc45ca115d37b2131c3
NetSupport Manager Agent Remote Buffer Overflow
Posted Mar 4, 2011
Authored by Luca Carettoni, jduck, Evan | Site metasploit.com

This Metasploit module exploits a buffer overflow in NetSupport Manager Agent. It uses a similar ROP to the proftpd_iac exploit in order to avoid non executable stack.

tags | exploit, overflow
advisories | CVE-2011-0404, OSVDB-70408
SHA-256 | 97cfba55ad99e70aab89080a5fd28096914ddedef3359cfe0a68bdb2d98b0bff
Mandriva Linux Security Advisory 2011-023
Posted Feb 8, 2011
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2011-023 - Heap-based buffer overflow in the sql_prepare_where function in ProFTPD before 1.3.3d, when mod_sql is enabled, allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted username containing substitution tags, which are not properly handled during construction of an SQL query.

tags | advisory, remote, denial of service, overflow, arbitrary
systems | linux, mandriva
advisories | CVE-2010-4652
SHA-256 | 515d49dc9513a1f6586e829388a19b81f06513f924d43218ea4eac91318d6fd7
Secunia Security Advisory 43234
Posted Feb 8, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in ProFTPD, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | d0323f010760e8d6cde09179731701cbfa4dd40fbf212bf13da0f3ec1c411aea
ProFTPD mod_sftp Integer Overflow
Posted Feb 7, 2011
Authored by Kingcope

ProFTPD mod_sftp integer overflow denial of service proof of concept exploit.

tags | exploit, denial of service, overflow, proof of concept
SHA-256 | 8be96176ffeabb738a525695e7d76457f45c838d9df2d027c6217df3d5d527c2
ProFTPD 1.2 - 1.3.0 sreplace Buffer Overflow (Linux)
Posted Jan 10, 2011
Authored by Evgeny Legerov, jduck | Site metasploit.com

This Metasploit module exploits a stack-based buffer overflow in versions 1.2 through 1.3.0 of ProFTPD server. The vulnerability is within the "sreplace" function within the "src/support.c" file. The off-by-one heap overflow bug in the ProFTPD sreplace function has been discovered about 2 (two) years ago by Evgeny Legerov.

tags | exploit, overflow
advisories | CVE-2006-5815, OSVDB-68985
SHA-256 | 41d4996163aa5db3c1f65003fa4feea5044edfa1112cac105c463346d43f029b
GNU libc/regcomp(3) Overflow / Stack Exhaustion
Posted Jan 7, 2011
Authored by Maksymilian Arciemowicz

GNU libc/regcomp(3) suffers from overflow and stack exhaustion vulnerabilities. proftpd.gnu.c exploit included.

tags | exploit, overflow, vulnerability
systems | linux
advisories | CVE-2010-4051, CVE-2010-4052
SHA-256 | 43e26bde432a5e50b401382b8c5f29be36e9aef9c061f0a6cff7b5f6cc7132b4
Secunia Security Advisory 42449
Posted Dec 3, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in ProFTPD, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | 93d7c62129f0f21b47890c47d4330d0cfaadf6d7346919e31c6cc1bc32aa32bc
ProFTPD 1.3.3c Trojan Source Code
Posted Dec 3, 2010

ProFTPD version 1.3.3c compromised source remote root trojan code.

tags | exploit, remote, root, trojan
SHA-256 | 2b3de844c19ee4976c43fb307f8a5ad677fb8b4b2968ed884a2b2c49ff518797
ProFTPD-1.3.3c Backdoor Command Execution
Posted Dec 3, 2010
Authored by MC, darkharper2 | Site metasploit.com

This Metasploit module exploits a malicious backdoor that was added to the ProFTPD download archive. This backdoor was present in the proftpd-1.3.3c.tar.[bz2|gz] archive between November 28th 2010 and 2nd December 2010.

tags | exploit
SHA-256 | 17094d8d6cc795f560232204708dd66d83a3dfa1fbf4de49a332bb625e731aef
Page 1 of 4
Back1234Next

File Archive:

August 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    20 Files
  • 2
    Aug 2nd
    4 Files
  • 3
    Aug 3rd
    6 Files
  • 4
    Aug 4th
    55 Files
  • 5
    Aug 5th
    16 Files
  • 6
    Aug 6th
    0 Files
  • 7
    Aug 7th
    0 Files
  • 8
    Aug 8th
    0 Files
  • 9
    Aug 9th
    0 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close