CVE-2006-6171 Affecting proftpd-dfsg package, versions <1.3.0-13


Severity

Recommended
low

Based on Debian security rating.

Threat Intelligence

EPSS
1.97% (89th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIANUNSTABLE-PROFTPDDFSG-336424
  • published30 Nov 2006
  • disclosed30 Nov 2006

Introduced: 30 Nov 2006

CVE-2006-6171  (opens in a new tab)

How to fix?

Upgrade Debian:unstable proftpd-dfsg to version 1.3.0-13 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream proftpd-dfsg package and not the proftpd-dfsg package as distributed by Debian. See How to fix? for Debian:unstable relevant fixed versions and status.

ProFTPD 1.3.0a and earlier does not properly set the buffer size limit when CommandBufferSize is specified in the configuration file, which leads to an off-by-two buffer underflow. NOTE: in November 2006, the role of CommandBufferSize was originally associated with CVE-2006-5815, but this was an error stemming from a vague initial disclosure. NOTE: ProFTPD developers dispute this issue, saying that the relevant memory location is overwritten by assignment before further use within the affected function, so this is not a vulnerability

CVSS Scores

version 3.1