CVE-2011-4130

Source
https://nvd.nist.gov/vuln/detail/CVE-2011-4130
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2011-4130.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2011-4130
Related
Published
2011-12-06T11:55:06Z
Modified
2024-11-18T05:00:19Z
Summary
[none]
Details

Use-after-free vulnerability in the Response API in ProFTPD before 1.3.3g allows remote authenticated users to execute arbitrary code via vectors involving an error that occurs after an FTP data transfer.

References

Affected packages

Debian:11 / proftpd-dfsg

Package

Name
proftpd-dfsg
Purl
pkg:deb/debian/proftpd-dfsg?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.3.4~rc3-2

Ecosystem specific

{
    "urgency": "high"
}

Debian:12 / proftpd-dfsg

Package

Name
proftpd-dfsg
Purl
pkg:deb/debian/proftpd-dfsg?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.3.4~rc3-2

Ecosystem specific

{
    "urgency": "high"
}

Debian:13 / proftpd-dfsg

Package

Name
proftpd-dfsg
Purl
pkg:deb/debian/proftpd-dfsg?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.3.4~rc3-2

Ecosystem specific

{
    "urgency": "high"
}