[Bug 997113] Re: Ubuntu 8.04.4 LTS - Proftpd SQL exploit
Marc Deslauriers
marc.deslauriers at canonical.com
Mon May 14 14:05:28 UTC 2012
Lucid currently contains proftpd 1.3.2c-1ubuntu0.1, so it isn't
vulnerable to this issue.
** Package changed: proftpd (Ubuntu) => proftpd-dfsg (Ubuntu)
** Visibility changed to: Public
** Changed in: proftpd-dfsg (Ubuntu)
Status: New => Invalid
--
You received this bug notification because you are a member of ProFTPD
Maintainance Team, which is subscribed to proftpd-dfsg in Ubuntu.
https://bugs.launchpad.net/bugs/997113
Title:
Ubuntu 8.04.4 LTS - Proftpd SQL exploit
Status in “proftpd-dfsg” package in Ubuntu:
Invalid
Bug description:
Proftpd version 1.3.1-6ubuntu1 exploit:
The variable substitution feature in the version of ProFTPD running on
the remote host can be abused to conduct a SQL injection attack. For
example, a remote attacker can bypass authentication using a specially
crafted username containing a percent sign character ('%'), a single
quote, and SQL code.
http://www.securityfocus.com/archive/1/500823/30/0/threaded
http://bugs.proftpd.org/show_bug.cgi?id=3124
http://bugs.proftpd.org/show_bug.cgi?id=3180
http://www.proftpd.org/docs/RELEASE_NOTES-1.3.2rc3
http://www.proftpd.org/docs/NEWS-1.3.2rc3
http://comments.gmane.org/gmane.comp.security.oss.general/1489
Solution: Upgrade to ProFTPD 1.3.2rc3 or later.
Could this be fixed in Ubuntu 8.04.4 LTS?
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/proftpd-dfsg/+bug/997113/+subscriptions
More information about the Pkg-proftpd-maintainers
mailing list