CVE-2011-4130

Publication date 6 December 2011

Last updated 24 July 2024


Ubuntu priority

Use-after-free vulnerability in the Response API in ProFTPD before 1.3.3g allows remote authenticated users to execute arbitrary code via vectors involving an error that occurs after an FTP data transfer.

Read the notes from the security team

Status

No maintained releases are affected by this CVE.

Package Ubuntu Release Status
proftpd-dfsg 13.10 saucy
Not affected
13.04 raring
Not affected
12.10 quantal
Not affected
12.04 LTS precise
Not affected
11.10 oneiric
Not affected
11.04 natty Ignored end of life
10.10 maverick Ignored end of life
10.04 LTS lucid Ignored end of life
8.04 LTS hardy
Not affected

Notes


jdstrand

1.3.1 is known not to be affected (see DSA-2346-1) DSA-2346-1 introduced a regression code not affected in 11.10 per udienz

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
proftpd-dfsg