CVE-2006-5815
Severity CVSS v4.0:
Pending analysis
Type:
CWE-119
Buffer Errors
Publication date:
08/11/2006
Last modified:
09/04/2025
Description
Stack-based buffer overflow in the sreplace function in ProFTPD 1.3.0 and earlier allows remote attackers, probably authenticated, to cause a denial of service and execute arbitrary code, as demonstrated by vd_proftpd.pm, a "ProFTPD remote exploit."
Impact
Base Score 2.0
10.00
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:proftpd_project:proftpd:*:*:*:*:*:*:*:* | 1.3.0 (including) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://bugs.proftpd.org/show_bug.cgi?id=2858
- http://gleg.net/vulndisco_meta.shtml
- http://secunia.com/advisories/22803
- http://secunia.com/advisories/22821
- http://secunia.com/advisories/23000
- http://secunia.com/advisories/23069
- http://secunia.com/advisories/23125
- http://secunia.com/advisories/23174
- http://secunia.com/advisories/23179
- http://secunia.com/advisories/23184
- http://secunia.com/advisories/23207
- http://securitytracker.com/id?1017167=
- http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.502491
- http://www.debian.org/security/2006/dsa-1222
- http://www.gentoo.org/security/en/glsa/glsa-200611-26.xml
- http://www.mandriva.com/security/advisories?name=MDKSA-2006%3A217
- http://www.mandriva.com/security/advisories?name=MDKSA-2006%3A217-1
- http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.035-proftpd.html
- http://www.securityfocus.com/archive/1/452760/100/200/threaded
- http://www.securityfocus.com/bid/20992
- http://www.trustix.org/errata/2006/0066/
- http://www.trustix.org/errata/2006/0070
- http://www.vupen.com/english/advisories/2006/4451
- https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=214820
- https://exchange.xforce.ibmcloud.com/vulnerabilities/30147
- http://bugs.proftpd.org/show_bug.cgi?id=2858
- http://gleg.net/vulndisco_meta.shtml
- http://secunia.com/advisories/22803
- http://secunia.com/advisories/22821
- http://secunia.com/advisories/23000
- http://secunia.com/advisories/23069
- http://secunia.com/advisories/23125
- http://secunia.com/advisories/23174
- http://secunia.com/advisories/23179
- http://secunia.com/advisories/23184
- http://secunia.com/advisories/23207
- http://securitytracker.com/id?1017167=
- http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.502491
- http://www.debian.org/security/2006/dsa-1222
- http://www.gentoo.org/security/en/glsa/glsa-200611-26.xml
- http://www.mandriva.com/security/advisories?name=MDKSA-2006%3A217
- http://www.mandriva.com/security/advisories?name=MDKSA-2006%3A217-1
- http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.035-proftpd.html
- http://www.securityfocus.com/archive/1/452760/100/200/threaded
- http://www.securityfocus.com/bid/20992
- http://www.trustix.org/errata/2006/0066/
- http://www.trustix.org/errata/2006/0070
- http://www.vupen.com/english/advisories/2006/4451
- https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=214820
- https://exchange.xforce.ibmcloud.com/vulnerabilities/30147