blob: 3e2513bfa6fc22db3c299245533fb6000835b73a [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200502-26">
<title>GProFTPD: gprostats format string vulnerability</title>
gprostats, distributed with GProFTPD, is vulnerable to a format string
vulnerability, potentially leading to the execution of arbitrary code.
<product type="ebuild">GProFTPD</product>
<announced>February 18, 2005</announced>
<revised>May 22, 2006: 02</revised>
<package name="net-ftp/gproftpd" auto="yes" arch="*">
<unaffected range="ge">8.1.9</unaffected>
<vulnerable range="lt">8.1.9</vulnerable>
GProFTPD is a GTK+ administration tool for the ProFTPD server. GProFTPD
is distributed with gprostats, a utility to parse ProFTPD transfer
Tavis Ormandy of the Gentoo Linux Security Audit Team has identified a
format string vulnerability in the gprostats utility.
<impact type="normal">
An attacker could exploit the vulnerability by performing a specially
crafted FTP transfer, the resulting ProFTPD transfer log could
potentially trigger the execution of arbitrary code when parsed by
There is no known workaround at this time.
All GProFTPD users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=net-ftp/gproftpd-8.1.9&quot;</code>
<uri link="">CVE-2005-0484</uri>
<metadata tag="requester" timestamp="Wed, 16 Feb 2005 19:27:51 +0000">
<metadata tag="submitter" timestamp="Thu, 17 Feb 2005 00:01:48 +0000">
<metadata tag="bugReady" timestamp="Fri, 18 Feb 2005 09:37:53 +0000">