Search CVE reports
1 – 10 of 34 results
Buffer Overflow vulnerability in Proftpd commit 4017eff8 allows a remote attacker to execute arbitrary code and can cause a Denial of Service (DoS) on the FTP service by sending a maliciously crafted message to the ProFTPD service port.
1 affected package
proftpd-dfsg
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
proftpd-dfsg | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation |
In ProFTPD through 1.3.8b before cec01cc, supplemental group inheritance grants unintended access to GID 0 because of the lack of supplemental groups from mod_sql.
1 affected package
proftpd-dfsg
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
proftpd-dfsg | Fixed | Fixed | Fixed | Not affected |
Some fixes available 2 of 6
make_ftp_cmd in main.c in ProFTPD before 1.3.8a has a one-byte out-of-bounds read, and daemon crash, because of mishandling of quote/backslash semantics.
1 affected package
proftpd-dfsg
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
proftpd-dfsg | Not affected | Fixed | Fixed | Needs evaluation |
Some fixes available 38 of 85
The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation...
13 affected packages
dropbear, golang-go.crypto, snapd, lxd, libssh...
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
dropbear | Needs evaluation | Fixed | Fixed | Fixed |
golang-go.crypto | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation |
snapd | Not affected | Not affected | Not affected | Not affected |
lxd | Not in release | Not in release | Not affected | Fixed |
libssh | Not affected | Fixed | Fixed | Not affected |
openssh-ssh1 | Ignored | Ignored | Ignored | Ignored |
libssh2 | Not affected | Not affected | Not affected | Not affected |
openssh | Fixed | Fixed | Fixed | Fixed |
paramiko | Fixed | Fixed | Fixed | Needs evaluation |
putty | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation |
proftpd-dfsg | Not affected | Not affected | Fixed | Needs evaluation |
python-asyncssh | Fixed | Fixed | Fixed | Ignored |
filezilla | Fixed | Fixed | Fixed | Not affected |
mod_radius in ProFTPD before 1.3.7c allows memory disclosure to RADIUS servers because it copies blocks of 16 characters.
1 affected package
proftpd-dfsg
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
proftpd-dfsg | Not affected | Not affected | Needs evaluation | Needs evaluation |
In ProFTPD 1.3.7, it is possible to corrupt the memory pool by interrupting the data transfer channel. This triggers a use-after-free in alloc_pool in pool.c, and possible remote code execution.
1 affected package
proftpd-dfsg
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
proftpd-dfsg | Not affected | Not affected | Not affected | Vulnerable |
ProFTPD 1.3.7 has an out-of-bounds (OOB) read vulnerability in mod_cap via the cap_text.c cap_to_text function.
1 affected package
proftpd-dfsg
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
proftpd-dfsg | — | — | — | Not affected |
An issue was discovered in tls_verify_crl in ProFTPD before 1.3.6. Direct dereference of a NULL pointer (a variable initialized to NULL) leads to a crash when validating the certificate of a client connecting to the server in a...
1 affected package
proftpd-dfsg
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
proftpd-dfsg | Not affected | Not affected | Not affected | Needs evaluation |
An issue was discovered in tls_verify_crl in ProFTPD before 1.3.6. A wrong iteration variable, used when checking a client certificate against CRL entries (installed by a system administrator), can cause some CRL entries to be...
1 affected package
proftpd-dfsg
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
proftpd-dfsg | Not affected | Not affected | Not affected | Needs evaluation |
An issue was discovered in tls_verify_crl in ProFTPD through 1.3.6b. Failure to check for the appropriate field of a CRL entry (checking twice for subject, rather than once for subject and once for issuer) prevents some valid CRLs...
1 affected package
proftpd-dfsg
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
proftpd-dfsg | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation |