Description
Use-after-free vulnerability in the Response API in ProFTPD before 1.3.3g allows remote authenticated users to execute arbitrary code via vectors involving an error that occurs after an FTP data transfer.
Published: 2011-12-06
Score: 9.0 Critical
EPSS: 1.3% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-2346-1 proftpd-dfsg security update
EUVD EUVD EUVD-2011-4078 Use-after-free vulnerability in the Response API in ProFTPD before 1.3.3g allows remote authenticated users to execute arbitrary code via vectors involving an error that occurs after an FTP data transfer.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-07T00:01:50.467Z

Reserved: 2011-10-18T00:00:00.000Z

Link: CVE-2011-4130

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2011-12-06T11:55:06.503

Modified: 2025-04-11T00:51:21.963

Link: CVE-2011-4130

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses