CVE-2011-4130
Publication date 6 December 2011
Last updated 24 July 2024
Ubuntu priority
Use-after-free vulnerability in the Response API in ProFTPD before 1.3.3g allows remote authenticated users to execute arbitrary code via vectors involving an error that occurs after an FTP data transfer.
Status
Package | Ubuntu Release | Status |
---|---|---|
proftpd-dfsg | 13.10 saucy |
Not affected
|
13.04 raring |
Not affected
|
|
12.10 quantal |
Not affected
|
|
12.04 LTS precise |
Not affected
|
|
11.10 oneiric |
Not affected
|
|
11.04 natty | Ignored end of life | |
10.10 maverick | Ignored end of life | |
10.04 LTS lucid | Ignored end of life | |
8.04 LTS hardy |
Not affected
|
Notes
jdstrand
1.3.1 is known not to be affected (see DSA-2346-1) DSA-2346-1 introduced a regression code not affected in 11.10 per udienz
Patch details
Package | Patch details |
---|---|
proftpd-dfsg |