Darcsweb-Url: 
http://darcs.frugalware.org/darcsweb/darcsweb.cgi?r=homepage-ng;a=darcs_commitdiff;h=20061125144212-dd049-c8215cf2c88b142d64f54a5eac6e1a5a1b4cc871.gz;

[FSA59-proftpd
voroskoi <[EMAIL PROTECTED]>**20061125144212] {
hunk ./frugalware/xml/security.xml 29
+       <fsa>
+               <id>59</id>
+               <date>2006-11-25</date>
+               <author>voroskoi</author>
+               <package>proftpd</package>
+               <vulnerable>1.3.0-1</vulnerable>
+               <unaffected>1.3.0-2siwenna1</unaffected>
+               <bts>http://bugs.frugalware.org/task/1484</bts>
+               <cve>There is no CVE for this issue, see: 
http://secunia.com/advisories/22821</cve>
+               <desc>A vulnerability has been reported in ProFTPD, which can 
be exploited by malicious people to cause a DoS (Denial of Service).
+                       The vulnerability is caused due to an error within the 
"cmd_loop()" function in main.c when the "CommandBufferSize" option is 
enabled.</desc>
+       </fsa>
}
_______________________________________________
Frugalware-darcs mailing list
Frugalware-darcs@frugalware.org
http://frugalware.org/mailman/listinfo/frugalware-darcs

Reply via email to