A vulnerability has been discovered in ProFTPd which could result in memory disclosure.
Package | net-ftp/proftpd on all architectures |
---|---|
Affected versions | < 1.3.7c |
Unaffected versions | >= 1.3.7c |
ProFTPD is an advanced and very configurable FTP server.
ProFTPd unconditionally sends passwords to Radius servers for authentication in multiples of 16 bytes. If a password is not of a length that is a multiple of 16 bytes, ProFTPd will read beyond the end of the password string and send bytes beyond the end of the string buffer.
Radius servers used for authentication can receive the contents of the ProFTPd process' memory.
There is no known workaround at this time.
All ProFTPd users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-ftp/proftpd-1.3.7c"
Release date
May 03, 2023
Latest revision
May 03, 2023: 1
Severity
low
Exploitable
remote
Bugzilla entries