Description
Heap-based buffer overflow in the sql_prepare_where function (contrib/mod_sql.c) in ProFTPD before 1.3.3d, when mod_sql is enabled, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted username containing substitution tags, which are not properly handled during construction of an SQL query.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-2191-1 | proftpd security update |
EUVD |
EUVD-2010-4617 | Heap-based buffer overflow in the sql_prepare_where function (contrib/mod_sql.c) in ProFTPD before 1.3.3d, when mod_sql is enabled, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted username containing substitution tags, which are not properly handled during construction of an SQL query. |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-07T03:51:17.964Z
Reserved: 2011-01-03T00:00:00.000Z
Link: CVE-2010-4652
No data.
Status : Deferred
Published: 2011-02-02T01:00:04.533
Modified: 2025-04-11T00:51:21.963
Link: CVE-2010-4652
No data.
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
EUVD