Bug 651607 (CVE-2010-4221)

Summary: CVE-2010-4221 proftpd: multiple stack-based buffer overflows in pr_netio_telnet_gets()
Product: [Other] Security Response Reporter: Vincent Danen <vdanen>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: unspecifiedCC: matthias, paul
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2011-07-01 04:58:09 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 651608    
Bug Blocks:    

Description Vincent Danen 2010-11-09 21:36:36 UTC
Common Vulnerabilities and Exposures assigned an identifier CVE-2010-4221 to
the following vulnerability:

Name: CVE-2010-4221
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4221
Assigned: 20101109
Reference: MISC: http://www.zerodayinitiative.com/advisories/ZDI-10-229/
Reference: CONFIRM: http://bugs.proftpd.org/show_bug.cgi?id=3521
Reference: CONFIRM: http://www.proftpd.org/docs/NEWS-1.3.3c
Reference: BID:44562
Reference: URL: http://www.securityfocus.com/bid/44562
Reference: SECUNIA:42052
Reference: URL: http://secunia.com/advisories/42052

Multiple stack-based buffer overflows in the pr_netio_telnet_gets
function in netio.c in ProFTPD before 1.3.3c allow remote attackers to
execute arbitrary code via vectors involving a TELNET IAC escape
character to a (1) FTP or (2) FTPS server.


Note: the impact of this is somewhat lessened as proftpd runs as the 'nobody' user.  According to upstream, this vulnerability has been present since 1.3.2rc3.

Comment 1 Vincent Danen 2010-11-09 21:38:02 UTC
Created proftpd tracking bugs for this issue

Affects: fedora-all [bug 651608]

Comment 2 Paul Howarth 2011-06-29 12:06:32 UTC
I believe this one can be closed now.

Comment 3 Vincent Danen 2011-07-01 04:58:09 UTC
All current releases now have this fixed.

F-15 and Rawhide have 1.3.4rc2.

EL-4, EL-5, EL-6, F-13 and F-14 have 1.3.3e.