Package: proftpd
Version: 1.2.10-15sarge3
Severity: grave
Tags: security
Justification: user security hole

According to 

http://www.securityfocus.com/bid/16535

the proftpd in sarge is still vulnerable to CVE-2005-4816:

Buffer overflow in mod_radius in ProFTPD before 1.3.0rc2 allows remote
attackers to cause a denial of service (crash) and possibly execute
arbitrary code via a long password.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to