Package: proftpd Version: 1.2.10-15sarge3 Severity: grave Tags: security Justification: user security hole
According to http://www.securityfocus.com/bid/16535 the proftpd in sarge is still vulnerable to CVE-2005-4816: Buffer overflow in mod_radius in ProFTPD before 1.3.0rc2 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long password. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

