CVE-2010-4652
Severity CVSS v4.0:
Pending analysis
Type:
CWE-119
Buffer Errors
Publication date:
02/02/2011
Last modified:
11/04/2025
Description
Heap-based buffer overflow in the sql_prepare_where function (contrib/mod_sql.c) in ProFTPD before 1.3.3d, when mod_sql is enabled, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted username containing substitution tags, which are not properly handled during construction of an SQL query.
Impact
Base Score 2.0
6.80
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:proftpd:proftpd:*:c:*:*:*:*:*:* | 1.3.3 (including) | |
| cpe:2.3:a:proftpd:proftpd:1.2.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:proftpd:proftpd:1.2.0:pre10:*:*:*:*:*:* | ||
| cpe:2.3:a:proftpd:proftpd:1.2.0:pre9:*:*:*:*:*:* | ||
| cpe:2.3:a:proftpd:proftpd:1.2.0:rc1:*:*:*:*:*:* | ||
| cpe:2.3:a:proftpd:proftpd:1.2.0:rc2:*:*:*:*:*:* | ||
| cpe:2.3:a:proftpd:proftpd:1.2.0:rc3:*:*:*:*:*:* | ||
| cpe:2.3:a:proftpd:proftpd:1.2.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:proftpd:proftpd:1.2.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:proftpd:proftpd:1.2.2:rc1:*:*:*:*:*:* | ||
| cpe:2.3:a:proftpd:proftpd:1.2.2:rc2:*:*:*:*:*:* | ||
| cpe:2.3:a:proftpd:proftpd:1.2.2:rc3:*:*:*:*:*:* | ||
| cpe:2.3:a:proftpd:proftpd:1.2.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:proftpd:proftpd:1.2.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:proftpd:proftpd:1.2.5:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://bugs.proftpd.org/show_bug.cgi?id=3536
- http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053537.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053540.html
- http://phrack.org/issues.html?issue=67&id=7#article
- http://proftpd.org/docs/RELEASE_NOTES-1.3.3d
- http://www.debian.org/security/2011/dsa-2191
- http://www.mandriva.com/security/advisories?name=MDVSA-2011%3A023
- http://www.securityfocus.com/bid/44933
- http://www.vupen.com/english/advisories/2011/0248
- http://www.vupen.com/english/advisories/2011/0331
- https://bugzilla.redhat.com/show_bug.cgi?id=670170
- http://bugs.proftpd.org/show_bug.cgi?id=3536
- http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053537.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053540.html
- http://phrack.org/issues.html?issue=67&id=7#article
- http://proftpd.org/docs/RELEASE_NOTES-1.3.3d
- http://www.debian.org/security/2011/dsa-2191
- http://www.mandriva.com/security/advisories?name=MDVSA-2011%3A023
- http://www.securityfocus.com/bid/44933
- http://www.vupen.com/english/advisories/2011/0248
- http://www.vupen.com/english/advisories/2011/0331
- https://bugzilla.redhat.com/show_bug.cgi?id=670170



