ALT-PU-2015-1457-1
Closed vulnerabilities
Published: 2016-07-07
Modified: 2024-07-05
Modified: 2024-07-05
BDU:2015-02003
Уязвимости операционной системы Debian GNU/Linux, позволяющие локальному злоумышленнику нарушить целостность защищаемой информации
Severity: LOW (1.2)
Vector: AV:L/AC:H/Au:N/C:N/I:P/A:N
References:
Published: 2013-01-24
Modified: 2025-04-11
Modified: 2025-04-11
CVE-2012-6095
ProFTPD before 1.3.5rc1, when using the UserOwner directive, allows local users to modify the ownership of arbitrary files via a race condition and a symlink attack on the (1) MKD or (2) XMKD commands.
Severity: LOW (1.2)
Vector: AV:L/AC:H/Au:N/C:N/I:P/A:N
References:
- http://bugs.proftpd.org/show_bug.cgi?id=3841
- http://proftpd.org/docs/NEWS-1.3.5rc1
- http://secunia.com/advisories/51823
- http://www.debian.org/security/2013/dsa-2606
- http://www.openwall.com/lists/oss-security/2013/01/07/3
- http://bugs.proftpd.org/show_bug.cgi?id=3841
- http://proftpd.org/docs/NEWS-1.3.5rc1
- http://secunia.com/advisories/51823
- http://www.debian.org/security/2013/dsa-2606
- http://www.openwall.com/lists/oss-security/2013/01/07/3
Published: 2013-09-30
Modified: 2025-04-11
Modified: 2025-04-11
CVE-2013-4359
Integer overflow in kbdint.c in mod_sftp in ProFTPD 1.3.4d and 1.3.5r3 allows remote attackers to cause a denial of service (memory consumption) via a large response count value in an authentication request, which triggers a large memory allocation.
Severity: MEDIUM (5.0)
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
References:
- http://bugs.proftpd.org/show_bug.cgi?id=3973
- http://kingcope.wordpress.com/2013/09/11/proftpd-mod_sftpmod_sftp_pam-invalid-pool-allocation-in-kbdint-authentication/
- http://lists.opensuse.org/opensuse-updates/2013-10/msg00032.html
- http://lists.opensuse.org/opensuse-updates/2015-06/msg00020.html
- http://www.debian.org/security/2013/dsa-2767
- http://www.openwall.com/lists/oss-security/2013/09/17/6
- http://bugs.proftpd.org/show_bug.cgi?id=3973
- http://kingcope.wordpress.com/2013/09/11/proftpd-mod_sftpmod_sftp_pam-invalid-pool-allocation-in-kbdint-authentication/
- http://lists.opensuse.org/opensuse-updates/2013-10/msg00032.html
- http://lists.opensuse.org/opensuse-updates/2015-06/msg00020.html
- http://www.debian.org/security/2013/dsa-2767
- http://www.openwall.com/lists/oss-security/2013/09/17/6