CVE Reference: CVE-2006-6170

NOTE: The text on this page is written by CVE MITRE and reflects neither the opinions of Secunia or the results of our research. All data on this page is written and maintained by CVE MITRE.

Original Page at CVE MITRE:
CVE-2006-6170

Description:
Buffer overflow in the tls_x509_name_oneline function in the mod_tls module, as used in ProFTPD 1.3.0a and earlier, and possibly other products, allows remote attackers to execute arbitrary code via a large data length argument, a different vulnerability than CVE-2006-5815.

CVE Status:
Candidate

References:

XF
  http://xforce.iss.net/xforce/xfdb/30554

TRUSTIX
  http://www.trustix.org/errata/2006/0066

SLACKWARE
  http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.502491

SAID
  Secunia Advisory: SA23141
  Secunia Advisory: SA23174
  Secunia Advisory: SA23179
  Secunia Advisory: SA23184
  Secunia Advisory: SA23207

MISC
  http://elegerov.blogspot.com/2006/10/do-you-remember-2-years-old-overflow.html

MANDRIVA
  http://www.mandriva.com/security/advisories?name=MDKSA-2006:217-1

GENTOO
  http://www.gentoo.org/security/en/glsa/glsa-200611-26.xml

FULLDISC
  http://lists.grok.org.uk/pipermail/full-disclosure/2006-November/050935.html

DEBIAN
  http://www.debian.org/security/2006/dsa-1222

CONFIRM

BUGTRAQ
  http://www.securityfocus.com/archive/1/archive/1/452993/100/100/threaded
  http://www.securityfocus.com/archive/1/archive/1/452872/100/0/threaded
  http://www.securityfocus.com/archive/1/archive/1/452228/100/100/threaded

BID
  21326


Return to the previous page.