CVE-2010-4221
Severity CVSS v4.0:
Pending analysis
Type:
CWE-119
Buffer Errors
Publication date:
09/11/2010
Last modified:
11/04/2025
Description
Multiple stack-based buffer overflows in the pr_netio_telnet_gets function in netio.c in ProFTPD before 1.3.3c allow remote attackers to execute arbitrary code via vectors involving a TELNET IAC escape character to a (1) FTP or (2) FTPS server.
Impact
Base Score 2.0
10.00
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:proftpd:proftpd:1.3.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:proftpd:proftpd:1.3.2:a:*:*:*:*:*:* | ||
| cpe:2.3:a:proftpd:proftpd:1.3.2:b:*:*:*:*:*:* | ||
| cpe:2.3:a:proftpd:proftpd:1.3.2:c:*:*:*:*:*:* | ||
| cpe:2.3:a:proftpd:proftpd:1.3.2:d:*:*:*:*:*:* | ||
| cpe:2.3:a:proftpd:proftpd:1.3.2:e:*:*:*:*:*:* | ||
| cpe:2.3:a:proftpd:proftpd:1.3.2:rc3:*:*:*:*:*:* | ||
| cpe:2.3:a:proftpd:proftpd:1.3.2:rc4:*:*:*:*:*:* | ||
| cpe:2.3:a:proftpd:proftpd:1.3.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:proftpd:proftpd:1.3.3:a:*:*:*:*:*:* | ||
| cpe:2.3:a:proftpd:proftpd:1.3.3:b:*:*:*:*:*:* | ||
| cpe:2.3:a:proftpd:proftpd:1.3.3:rc1:*:*:*:*:*:* | ||
| cpe:2.3:a:proftpd:proftpd:1.3.3:rc2:*:*:*:*:*:* | ||
| cpe:2.3:a:proftpd:proftpd:1.3.3:rc3:*:*:*:*:*:* | ||
| cpe:2.3:a:proftpd:proftpd:1.3.3:rc4:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://bugs.proftpd.org/show_bug.cgi?id=3521
- http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050687.html
- http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050703.html
- http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050726.html
- http://secunia.com/advisories/42052
- http://secunia.com/advisories/42217
- http://www.mandriva.com/security/advisories?name=MDVSA-2010%3A227
- http://www.proftpd.org/docs/NEWS-1.3.3c
- http://www.securityfocus.com/bid/44562
- http://www.vupen.com/english/advisories/2010/2941
- http://www.vupen.com/english/advisories/2010/2959
- http://www.vupen.com/english/advisories/2010/2962
- http://www.zerodayinitiative.com/advisories/ZDI-10-229/
- http://bugs.proftpd.org/show_bug.cgi?id=3521
- http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050687.html
- http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050703.html
- http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050726.html
- http://secunia.com/advisories/42052
- http://secunia.com/advisories/42217
- http://www.mandriva.com/security/advisories?name=MDVSA-2010%3A227
- http://www.proftpd.org/docs/NEWS-1.3.3c
- http://www.securityfocus.com/bid/44562
- http://www.vupen.com/english/advisories/2010/2941
- http://www.vupen.com/english/advisories/2010/2959
- http://www.vupen.com/english/advisories/2010/2962
- http://www.zerodayinitiative.com/advisories/ZDI-10-229/



