Vulnerability Description
Multiple stack-based buffer overflows in the pr_netio_telnet_gets function in netio.c in ProFTPD before 1.3.3c allow remote attackers to execute arbitrary code via vectors involving a TELNET IAC escape character to a (1) FTP or (2) FTPS server.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Proftpd | Proftpd | 1.3.2 |
Related Weaknesses (CWE)
References
- http://bugs.proftpd.org/show_bug.cgi?id=3521Exploit
- http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050687.h
- http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050703.h
- http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050726.h
- http://secunia.com/advisories/42052Vendor Advisory
- http://secunia.com/advisories/42217
- http://www.mandriva.com/security/advisories?name=MDVSA-2010:227
- http://www.proftpd.org/docs/NEWS-1.3.3c
- http://www.securityfocus.com/bid/44562Exploit
- http://www.vupen.com/english/advisories/2010/2941
- http://www.vupen.com/english/advisories/2010/2959
- http://www.vupen.com/english/advisories/2010/2962
- http://www.zerodayinitiative.com/advisories/ZDI-10-229/
- http://bugs.proftpd.org/show_bug.cgi?id=3521Exploit
- http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050687.h
FAQ
What is CVE-2010-4221?
CVE-2010-4221 is a vulnerability with a CVSS score of 10.0 (HIGH). Multiple stack-based buffer overflows in the pr_netio_telnet_gets function in netio.c in ProFTPD before 1.3.3c allow remote attackers to execute arbitrary code via vectors involving a TELNET IAC escap...
How severe is CVE-2010-4221?
CVE-2010-4221 has been rated HIGH with a CVSS base score of 10.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2010-4221?
Check the references section above for vendor advisories and patch information. Affected products include: Proftpd Proftpd.