CVE-2024-57392

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-57392
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-57392.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-57392
Related
Published
2025-02-06T22:15:39Z
Modified
2025-03-10T15:55:20.924334Z
Summary
[none]
Details

Buffer Overflow vulnerability in Proftpd commit 4017eff8 allows a remote attacker to execute arbitrary code and can cause a Denial of Service (DoS) on the FTP service by sending a maliciously crafted message to the ProFTPD service port.

References

Affected packages

Debian:11 / proftpd-dfsg

Package

Name
proftpd-dfsg
Purl
pkg:deb/debian/proftpd-dfsg?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.3.7a+dfsg-12+deb11u5

Affected versions

1.*

1.3.7a+dfsg-12
1.3.7a+dfsg-12+deb11u1
1.3.7a+dfsg-12+deb11u2
1.3.7a+dfsg-12+deb11u3

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / proftpd-dfsg

Package

Name
proftpd-dfsg
Purl
pkg:deb/debian/proftpd-dfsg?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.3.8+dfsg-4
1.3.8+dfsg-4+deb12u1
1.3.8+dfsg-4+deb12u2
1.3.8+dfsg-4+deb12u3
1.3.8+dfsg-4+deb12u4
1.3.8+dfsg-5
1.3.8+dfsg-6
1.3.8+dfsg-7
1.3.8+dfsg-8
1.3.8.a+dfsg-1
1.3.8.b+dfsg-1
1.3.8.b+dfsg-2
1.3.8.b+dfsg-3
1.3.8.b+dfsg-4
1.3.8.c+dfsg-1
1.3.8.c+dfsg-2

Ecosystem specific

{
    "urgency": "unimportant"
}

Debian:13 / proftpd-dfsg

Package

Name
proftpd-dfsg
Purl
pkg:deb/debian/proftpd-dfsg?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.3.8.c+dfsg-2

Affected versions

1.*

1.3.8+dfsg-4
1.3.8+dfsg-5
1.3.8+dfsg-6
1.3.8+dfsg-7
1.3.8+dfsg-8
1.3.8.a+dfsg-1
1.3.8.b+dfsg-1
1.3.8.b+dfsg-2
1.3.8.b+dfsg-3
1.3.8.b+dfsg-4
1.3.8.c+dfsg-1

Ecosystem specific

{
    "urgency": "unimportant"
}