MGASA-2025-0081

Source
https://advisories.mageia.org/MGASA-2025-0081.html
Import Source
https://advisories.mageia.org/MGASA-2025-0081.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2025-0081
Related
Published
2025-02-26T20:10:46Z
Modified
2025-02-26T19:40:45Z
Summary
Updated proftpd packages fix security vulnerability
Details

A buffer overflow vulnerability in Proftpd commit 4017eff8 allows a remote attacker to execute arbitrary code and can cause a denial of service (DoS) on the FTP service by sending a maliciously crafted message to the ProFTPD service port. (CVE-2024-57392)

References
Credits

Affected packages

Mageia:9 / proftpd

Package

Name
proftpd
Purl
pkg:rpm/mageia/proftpd?distro=mageia-9

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.3.8c-1.1.mga9

Ecosystem specific

{
    "section": "core"
}