Bug 651607 (CVE-2010-4221) - CVE-2010-4221 proftpd: multiple stack-based buffer overflows in pr_netio_telnet_gets()
Summary: CVE-2010-4221 proftpd: multiple stack-based buffer overflows in pr_netio_teln...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2010-4221
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 651608
Blocks:
TreeView+ depends on / blocked
 
Reported: 2010-11-09 21:36 UTC by Vincent Danen
Modified: 2021-03-17 14:01 UTC (History)
2 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2011-07-01 04:58:09 UTC
Embargoed:


Attachments (Terms of Use)

Description Vincent Danen 2010-11-09 21:36:36 UTC
Common Vulnerabilities and Exposures assigned an identifier CVE-2010-4221 to
the following vulnerability:

Name: CVE-2010-4221
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4221
Assigned: 20101109
Reference: MISC: http://www.zerodayinitiative.com/advisories/ZDI-10-229/
Reference: CONFIRM: http://bugs.proftpd.org/show_bug.cgi?id=3521
Reference: CONFIRM: http://www.proftpd.org/docs/NEWS-1.3.3c
Reference: BID:44562
Reference: URL: http://www.securityfocus.com/bid/44562
Reference: SECUNIA:42052
Reference: URL: http://secunia.com/advisories/42052

Multiple stack-based buffer overflows in the pr_netio_telnet_gets
function in netio.c in ProFTPD before 1.3.3c allow remote attackers to
execute arbitrary code via vectors involving a TELNET IAC escape
character to a (1) FTP or (2) FTPS server.


Note: the impact of this is somewhat lessened as proftpd runs as the 'nobody' user.  According to upstream, this vulnerability has been present since 1.3.2rc3.

Comment 1 Vincent Danen 2010-11-09 21:38:02 UTC
Created proftpd tracking bugs for this issue

Affects: fedora-all [bug 651608]

Comment 2 Paul Howarth 2011-06-29 12:06:32 UTC
I believe this one can be closed now.

Comment 3 Vincent Danen 2011-07-01 04:58:09 UTC
All current releases now have this fixed.

F-15 and Rawhide have 1.3.4rc2.

EL-4, EL-5, EL-6, F-13 and F-14 have 1.3.3e.


Note You need to log in before you can comment on or make changes to this bug.