blob: ea9f08b2c28652f826693869448a389e97b57949 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200903-27">
<title>ProFTPD: Multiple vulnerabilities</title>
Two vulnerabilities in ProFTPD might allow for SQL injection attacks.
<product type="ebuild">proftpd</product>
<announced>March 12, 2009</announced>
<revised>March 12, 2009: 01</revised>
<package name="net-ftp/proftpd" auto="yes" arch="*">
<unaffected range="ge">1.3.2</unaffected>
<vulnerable range="lt">1.3.2</vulnerable>
ProFTPD is an advanced and very configurable FTP server.
The following vulnerabilities were reported:
Percent characters in the username are not properly handled, which
introduces a single quote character during variable substitution by
mod_sql (CVE-2009-0542).
Some invalid, encoded multibyte characters are not properly handled in
mod_sql_mysql and mod_sql_postgres when NLS support is enabled
<impact type="normal">
A remote attacker could send specially crafted requests to the server,
possibly resulting in the execution of arbitrary SQL statements.
There is no known workaround at this time.
All ProFTPD users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=net-ftp/proftpd-1.3.2&quot;</code>
<uri link="">CVE-2009-0542</uri>
<uri link="">CVE-2009-0543</uri>
<metadata tag="requester" timestamp="Sat, 07 Mar 2009 18:36:42 +0000">
<metadata tag="submitter" timestamp="Thu, 12 Mar 2009 12:43:00 +0000">
<metadata tag="bugReady" timestamp="Thu, 12 Mar 2009 12:43:09 +0000">