|
Message-ID: <Pine.GSO.4.51.0902121045180.17219@faron.mitre.org> Date: Thu, 12 Feb 2009 10:45:25 -0500 (EST) From: "Steven M. Christey" <coley@...us.mitre.org> To: oss-security@...ts.openwall.com cc: coley@...us.mitre.org Subject: Re: CVE request for proftpd ====================================================== Name: CVE-2009-0542 Status: Candidate URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0542 Reference: BUGTRAQ:20090210 Another SQL injection in ProFTPd with mod_mysql (probably postgres as well) Reference: URL:http://www.securityfocus.com/archive/1/archive/1/500823/100/0/threaded Reference: BUGTRAQ:20090210 ProFTPd with mod_mysql Authentication Bypass Exploit Reference: URL:http://www.securityfocus.com/archive/1/archive/1/500851/100/0/threaded Reference: BUGTRAQ:20090210 Re: Another SQL injection in ProFTPd with mod_mysql (probably postgres as well) Reference: URL:http://www.securityfocus.com/archive/1/archive/1/500833/100/0/threaded Reference: BUGTRAQ:20090211 Re: Re: Another SQL injection in ProFTPd with mod_mysql (probably postgres as well) Reference: URL:http://www.securityfocus.com/archive/1/archive/1/500852/100/0/threaded Reference: MILW0RM:8037 Reference: URL:http://www.milw0rm.com/exploits/8037 Reference: MLIST:[oss-security] 20090211 CVE request for proftpd Reference: URL:http://www.openwall.com/lists/oss-security/2009/02/11/1 Reference: MLIST:[oss-security] 20090211 Re: CVE request for proftpd Reference: URL:http://www.openwall.com/lists/oss-security/2009/02/11/5 Reference: MLIST:[oss-security] 20090211 Re: CVE request for proftpd Reference: URL:http://www.openwall.com/lists/oss-security/2009/02/11/3 Reference: CONFIRM:http://bugs.proftpd.org/show_bug.cgi?id=3180 SQL injection vulnerability in ProFTPD Server 1.3.1 through 1.3.2rc2 allows remote attackers to execute arbitrary SQL commands via a "%" (percent) character in the username, which introduces a "'" (single quote) character during variable substitution by mod_sql. ====================================================== Name: CVE-2009-0543 Status: Candidate URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0543 Reference: MLIST:[oss-security] 20090211 CVE request for proftpd Reference: URL:http://www.openwall.com/lists/oss-security/2009/02/11/4 Reference: MLIST:[oss-security] 20090211 Re: CVE request for proftpd Reference: URL:http://www.openwall.com/lists/oss-security/2009/02/11/5 Reference: CONFIRM:http://bugs.proftpd.org/show_bug.cgi?id=3173 ProFTPD Server 1.3.1, with NLS support enabled, allows remote attackers to bypass SQL injection protection mechanisms via invalid, encoded multibyte characters, which are not properly handled in (1) mod_sql_mysql and (2) mod_sql_postgres.
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.