[Bug 997113] Re: Ubuntu 8.04.4 LTS - Proftpd SQL exploit

Marc Deslauriers marc.deslauriers at canonical.com
Mon May 14 14:05:28 UTC 2012


Lucid currently contains proftpd 1.3.2c-1ubuntu0.1, so it isn't
vulnerable to this issue.

** Package changed: proftpd (Ubuntu) => proftpd-dfsg (Ubuntu)

** Visibility changed to: Public

** Changed in: proftpd-dfsg (Ubuntu)
       Status: New => Invalid

-- 
You received this bug notification because you are a member of ProFTPD
Maintainance Team, which is subscribed to proftpd-dfsg in Ubuntu.
https://bugs.launchpad.net/bugs/997113

Title:
  Ubuntu 8.04.4 LTS - Proftpd SQL exploit

Status in “proftpd-dfsg” package in Ubuntu:
  Invalid

Bug description:
  Proftpd version 1.3.1-6ubuntu1 exploit:

  The variable substitution feature in the version of ProFTPD running on
  the remote host can be abused to conduct a SQL injection attack. For
  example, a remote attacker can bypass authentication using a specially
  crafted username containing a percent sign character ('%'), a single
  quote, and SQL code.

  http://www.securityfocus.com/archive/1/500823/30/0/threaded

  http://bugs.proftpd.org/show_bug.cgi?id=3124
  
http://bugs.proftpd.org/show_bug.cgi?id=3180

  http://www.proftpd.org/docs/RELEASE_NOTES-1.3.2rc3
http://www.proftpd.org/docs/NEWS-1.3.2rc3
  
http://comments.gmane.org/gmane.comp.security.oss.general/1489

  Solution: Upgrade to ProFTPD 1.3.2rc3 or later.

  Could this be fixed in Ubuntu 8.04.4 LTS?

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/proftpd-dfsg/+bug/997113/+subscriptions



More information about the Pkg-proftpd-maintainers mailing list