ProFTPd: Memory Disclosure — GLSA 202305-03

A vulnerability has been discovered in ProFTPd which could result in memory disclosure.

Affected packages

net-ftp/proftpd on all architectures
Affected versions < 1.3.7c
Unaffected versions >= 1.3.7c

Background

ProFTPD is an advanced and very configurable FTP server.

Description

ProFTPd unconditionally sends passwords to Radius servers for authentication in multiples of 16 bytes. If a password is not of a length that is a multiple of 16 bytes, ProFTPd will read beyond the end of the password string and send bytes beyond the end of the string buffer.

Impact

Radius servers used for authentication can receive the contents of the ProFTPd process' memory.

Workaround

There is no known workaround at this time.

Resolution

All ProFTPd users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=net-ftp/proftpd-1.3.7c"
 

References

Release date
May 03, 2023

Latest revision
May 03, 2023: 1

Severity
low

Exploitable
remote

Bugzilla entries