CVE-2006-6563

Stack-based buffer overflow in the pr_ctrls_recv_request function in ctrls.c in the mod_ctrls module in ProFTPD before 1.3.1rc1 allows local users to execute arbitrary code via a large reqarglen length value.
References
Link Resource
http://secunia.com/advisories/23371 Exploit Patch Vendor Advisory
http://secunia.com/advisories/23392
http://secunia.com/advisories/23473
http://secunia.com/advisories/24163
http://security.gentoo.org/glsa/glsa-200702-02.xml
http://www.coresecurity.com/?module=ContentMod&action=item&id=1594 Exploit Patch
http://www.mandriva.com/security/advisories?name=MDKSA-2006:232
http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.039.html
http://www.proftpd.org/docs/NEWS-1.3.1rc1
http://www.securityfocus.com/archive/1/454320/100/0/threaded
http://www.securityfocus.com/archive/1/460648/100/0/threaded
http://www.securityfocus.com/archive/1/460756/100/0/threaded
http://www.securityfocus.com/bid/21587 Exploit Patch
http://www.trustix.org/errata/2006/0074/
http://www.vupen.com/english/advisories/2006/4998
https://exchange.xforce.ibmcloud.com/vulnerabilities/30906
https://www.exploit-db.com/exploits/3330
http://secunia.com/advisories/23371 Exploit Patch Vendor Advisory
http://secunia.com/advisories/23392
http://secunia.com/advisories/23473
http://secunia.com/advisories/24163
http://security.gentoo.org/glsa/glsa-200702-02.xml
http://www.coresecurity.com/?module=ContentMod&action=item&id=1594 Exploit Patch
http://www.mandriva.com/security/advisories?name=MDKSA-2006:232
http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.039.html
http://www.proftpd.org/docs/NEWS-1.3.1rc1
http://www.securityfocus.com/archive/1/454320/100/0/threaded
http://www.securityfocus.com/archive/1/460648/100/0/threaded
http://www.securityfocus.com/archive/1/460756/100/0/threaded
http://www.securityfocus.com/bid/21587 Exploit Patch
http://www.trustix.org/errata/2006/0074/
http://www.vupen.com/english/advisories/2006/4998
https://exchange.xforce.ibmcloud.com/vulnerabilities/30906
https://www.exploit-db.com/exploits/3330
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:proftpd_project:proftpd:1.3.0:*:*:*:*:*:*:*
cpe:2.3:a:proftpd_project:proftpd:1.3.0a:*:*:*:*:*:*:*

History

21 Nov 2024, 00:22

Type Values Removed Values Added
References () http://secunia.com/advisories/23371 - Exploit, Patch, Vendor Advisory () http://secunia.com/advisories/23371 - Exploit, Patch, Vendor Advisory
References () http://secunia.com/advisories/23392 - () http://secunia.com/advisories/23392 -
References () http://secunia.com/advisories/23473 - () http://secunia.com/advisories/23473 -
References () http://secunia.com/advisories/24163 - () http://secunia.com/advisories/24163 -
References () http://security.gentoo.org/glsa/glsa-200702-02.xml - () http://security.gentoo.org/glsa/glsa-200702-02.xml -
References () http://www.coresecurity.com/?module=ContentMod&action=item&id=1594 - Exploit, Patch () http://www.coresecurity.com/?module=ContentMod&action=item&id=1594 - Exploit, Patch
References () http://www.mandriva.com/security/advisories?name=MDKSA-2006:232 - () http://www.mandriva.com/security/advisories?name=MDKSA-2006:232 -
References () http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.039.html - () http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.039.html -
References () http://www.proftpd.org/docs/NEWS-1.3.1rc1 - () http://www.proftpd.org/docs/NEWS-1.3.1rc1 -
References () http://www.securityfocus.com/archive/1/454320/100/0/threaded - () http://www.securityfocus.com/archive/1/454320/100/0/threaded -
References () http://www.securityfocus.com/archive/1/460648/100/0/threaded - () http://www.securityfocus.com/archive/1/460648/100/0/threaded -
References () http://www.securityfocus.com/archive/1/460756/100/0/threaded - () http://www.securityfocus.com/archive/1/460756/100/0/threaded -
References () http://www.securityfocus.com/bid/21587 - Exploit, Patch () http://www.securityfocus.com/bid/21587 - Exploit, Patch
References () http://www.trustix.org/errata/2006/0074/ - () http://www.trustix.org/errata/2006/0074/ -
References () http://www.vupen.com/english/advisories/2006/4998 - () http://www.vupen.com/english/advisories/2006/4998 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/30906 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/30906 -
References () https://www.exploit-db.com/exploits/3330 - () https://www.exploit-db.com/exploits/3330 -

Information

Published : 2006-12-15 11:28

Updated : 2024-11-21 00:22


NVD link : CVE-2006-6563

Mitre link : CVE-2006-6563

CVE.ORG link : CVE-2006-6563


JSON object : View

Products Affected

proftpd_project

  • proftpd