On Thursday 04 March 2004 20:44, Epic wrote: > Isn't > > "The vulnerability is caused due to a boundary error in the ASCII file > transfer component when translating newline characters. This can be > exploited to cause a buffer overflow by uploading and then downloading a > specially crafted file." > > And. > > > "The vulnerability is caused due to two off-by-one errors in the > "_xlate_ascii_write()" function. These can be exploited by sending a > specially crafted "RETR" FTP command with a 1023 bytes long argument > starting with a linefeed character." > > Different? > > I am not expert, and was wondering If this was actually something new in > the same ASCII File translation.?
i really don't think the vuln is new. The advisory you sent says proftpd < 1.2.9rc3 is vulnerable. 1.2.9rc3 was exactly the version THIS BUG was fixed. > > Epic > _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
