DEBIAN-CVE-2009-0543

Source
https://security-tracker.debian.org/tracker/CVE-2009-0543
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2009-0543.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2009-0543
Upstream
Published
2009-02-12T16:30:00Z
Modified
2025-09-25T00:09:24.730852Z
Summary
[none]
Details

ProFTPD Server 1.3.1, with NLS support enabled, allows remote attackers to bypass SQL injection protection mechanisms via invalid, encoded multibyte characters, which are not properly handled in (1) modsqlmysql and (2) modsqlpostgres.

References

Affected packages

Debian:11 / proftpd-dfsg

Package

Name
proftpd-dfsg
Purl
pkg:deb/debian/proftpd-dfsg?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.3.2-1

Ecosystem specific

{
    "urgency": "medium"
}

Debian:12 / proftpd-dfsg

Package

Name
proftpd-dfsg
Purl
pkg:deb/debian/proftpd-dfsg?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.3.2-1

Ecosystem specific

{
    "urgency": "medium"
}

Debian:13 / proftpd-dfsg

Package

Name
proftpd-dfsg
Purl
pkg:deb/debian/proftpd-dfsg?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.3.2-1

Ecosystem specific

{
    "urgency": "medium"
}

Debian:14 / proftpd-dfsg

Package

Name
proftpd-dfsg
Purl
pkg:deb/debian/proftpd-dfsg?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.3.2-1

Ecosystem specific

{
    "urgency": "medium"
}