CVE-2006-6170

Buffer overflow in the tls_x509_name_oneline function in the mod_tls module, as used in ProFTPD 1.3.0a and earlier, and possibly other products, allows remote attackers to execute arbitrary code via a large data length argument, a different vulnerability than CVE-2006-5815.
References
Link Resource
http://elegerov.blogspot.com/2006/10/do-you-remember-2-years-old-overflow.html Exploit Vendor Advisory
http://lists.grok.org.uk/pipermail/full-disclosure/2006-November/050935.html Exploit Vendor Advisory
http://secunia.com/advisories/23141 Vendor Advisory
http://secunia.com/advisories/23174
http://secunia.com/advisories/23179
http://secunia.com/advisories/23184
http://secunia.com/advisories/23207
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.502491
http://www.debian.org/security/2006/dsa-1222
http://www.gentoo.org/security/en/glsa/glsa-200611-26.xml
http://www.mandriva.com/security/advisories?name=MDKSA-2006:217-1
http://www.securityfocus.com/archive/1/452228/100/100/threaded
http://www.securityfocus.com/archive/1/452872/100/0/threaded
http://www.securityfocus.com/archive/1/452993/100/100/threaded
http://www.securityfocus.com/bid/21326
http://www.trustix.org/errata/2006/0066
http://www.vupen.com/english/advisories/2006/4745
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=214820 Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/30554
http://elegerov.blogspot.com/2006/10/do-you-remember-2-years-old-overflow.html Exploit Vendor Advisory
http://lists.grok.org.uk/pipermail/full-disclosure/2006-November/050935.html Exploit Vendor Advisory
http://secunia.com/advisories/23141 Vendor Advisory
http://secunia.com/advisories/23174
http://secunia.com/advisories/23179
http://secunia.com/advisories/23184
http://secunia.com/advisories/23207
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.502491
http://www.debian.org/security/2006/dsa-1222
http://www.gentoo.org/security/en/glsa/glsa-200611-26.xml
http://www.mandriva.com/security/advisories?name=MDKSA-2006:217-1
http://www.securityfocus.com/archive/1/452228/100/100/threaded
http://www.securityfocus.com/archive/1/452872/100/0/threaded
http://www.securityfocus.com/archive/1/452993/100/100/threaded
http://www.securityfocus.com/bid/21326
http://www.trustix.org/errata/2006/0066
http://www.vupen.com/english/advisories/2006/4745
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=214820 Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/30554
Configurations

Configuration 1 (hide)

cpe:2.3:a:proftpd_project:proftpd:*:*:*:*:*:*:*:*

History

21 Nov 2024, 00:22

Type Values Removed Values Added
References () http://elegerov.blogspot.com/2006/10/do-you-remember-2-years-old-overflow.html - Exploit, Vendor Advisory () http://elegerov.blogspot.com/2006/10/do-you-remember-2-years-old-overflow.html - Exploit, Vendor Advisory
References () http://lists.grok.org.uk/pipermail/full-disclosure/2006-November/050935.html - Exploit, Vendor Advisory () http://lists.grok.org.uk/pipermail/full-disclosure/2006-November/050935.html - Exploit, Vendor Advisory
References () http://secunia.com/advisories/23141 - Vendor Advisory () http://secunia.com/advisories/23141 - Vendor Advisory
References () http://secunia.com/advisories/23174 - () http://secunia.com/advisories/23174 -
References () http://secunia.com/advisories/23179 - () http://secunia.com/advisories/23179 -
References () http://secunia.com/advisories/23184 - () http://secunia.com/advisories/23184 -
References () http://secunia.com/advisories/23207 - () http://secunia.com/advisories/23207 -
References () http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.502491 - () http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.502491 -
References () http://www.debian.org/security/2006/dsa-1222 - () http://www.debian.org/security/2006/dsa-1222 -
References () http://www.gentoo.org/security/en/glsa/glsa-200611-26.xml - () http://www.gentoo.org/security/en/glsa/glsa-200611-26.xml -
References () http://www.mandriva.com/security/advisories?name=MDKSA-2006:217-1 - () http://www.mandriva.com/security/advisories?name=MDKSA-2006:217-1 -
References () http://www.securityfocus.com/archive/1/452228/100/100/threaded - () http://www.securityfocus.com/archive/1/452228/100/100/threaded -
References () http://www.securityfocus.com/archive/1/452872/100/0/threaded - () http://www.securityfocus.com/archive/1/452872/100/0/threaded -
References () http://www.securityfocus.com/archive/1/452993/100/100/threaded - () http://www.securityfocus.com/archive/1/452993/100/100/threaded -
References () http://www.securityfocus.com/bid/21326 - () http://www.securityfocus.com/bid/21326 -
References () http://www.trustix.org/errata/2006/0066 - () http://www.trustix.org/errata/2006/0066 -
References () http://www.vupen.com/english/advisories/2006/4745 - () http://www.vupen.com/english/advisories/2006/4745 -
References () https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=214820 - Vendor Advisory () https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=214820 - Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/30554 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/30554 -

Information

Published : 2006-11-30 15:28

Updated : 2024-11-21 00:22


NVD link : CVE-2006-6170

Mitre link : CVE-2006-6170

CVE.ORG link : CVE-2006-6170


JSON object : View

Products Affected

proftpd_project

  • proftpd