Lucene search

K
nvd[email protected]NVD:CVE-2010-4652
HistoryFeb 02, 2011 - 1:00 a.m.

CVE-2010-4652

2011-02-0201:00:04
CWE-119
web.nvd.nist.gov
2

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

8.1 High

AI Score

Confidence

High

0.256 Low

EPSS

Percentile

96.7%

Heap-based buffer overflow in the sql_prepare_where function (contrib/mod_sql.c) in ProFTPD before 1.3.3d, when mod_sql is enabled, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted username containing substitution tags, which are not properly handled during construction of an SQL query.

Affected configurations

NVD
Node
proftpdproftpdRange1.3.3c
OR
proftpdproftpdMatch1.2.0
OR
proftpdproftpdMatch1.2.0pre10
OR
proftpdproftpdMatch1.2.0pre9
OR
proftpdproftpdMatch1.2.0rc1
OR
proftpdproftpdMatch1.2.0rc2
OR
proftpdproftpdMatch1.2.0rc3
OR
proftpdproftpdMatch1.2.1
OR
proftpdproftpdMatch1.2.2
OR
proftpdproftpdMatch1.2.2rc1
OR
proftpdproftpdMatch1.2.2rc2
OR
proftpdproftpdMatch1.2.2rc3
OR
proftpdproftpdMatch1.2.3
OR
proftpdproftpdMatch1.2.4
OR
proftpdproftpdMatch1.2.5
OR
proftpdproftpdMatch1.2.5rc1
OR
proftpdproftpdMatch1.2.5rc2
OR
proftpdproftpdMatch1.2.5rc3
OR
proftpdproftpdMatch1.2.6
OR
proftpdproftpdMatch1.2.6rc1
OR
proftpdproftpdMatch1.2.6rc2
OR
proftpdproftpdMatch1.2.7
OR
proftpdproftpdMatch1.2.7rc1
OR
proftpdproftpdMatch1.2.7rc2
OR
proftpdproftpdMatch1.2.7rc3
OR
proftpdproftpdMatch1.2.8
OR
proftpdproftpdMatch1.2.8rc1
OR
proftpdproftpdMatch1.2.8rc2
OR
proftpdproftpdMatch1.2.9
OR
proftpdproftpdMatch1.2.9rc1
OR
proftpdproftpdMatch1.2.9rc2
OR
proftpdproftpdMatch1.2.9rc3
OR
proftpdproftpdMatch1.2.10
OR
proftpdproftpdMatch1.2.10rc1
OR
proftpdproftpdMatch1.2.10rc2
OR
proftpdproftpdMatch1.2.10rc3
OR
proftpdproftpdMatch1.3.0
OR
proftpdproftpdMatch1.3.0a
OR
proftpdproftpdMatch1.3.0rc1
OR
proftpdproftpdMatch1.3.0rc2
OR
proftpdproftpdMatch1.3.0rc3
OR
proftpdproftpdMatch1.3.0rc4
OR
proftpdproftpdMatch1.3.0rc5
OR
proftpdproftpdMatch1.3.1
OR
proftpdproftpdMatch1.3.1rc1
OR
proftpdproftpdMatch1.3.1rc2
OR
proftpdproftpdMatch1.3.1rc3
OR
proftpdproftpdMatch1.3.2
OR
proftpdproftpdMatch1.3.2a
OR
proftpdproftpdMatch1.3.2b
OR
proftpdproftpdMatch1.3.2c
OR
proftpdproftpdMatch1.3.2d
OR
proftpdproftpdMatch1.3.2e
OR
proftpdproftpdMatch1.3.2rc1
OR
proftpdproftpdMatch1.3.2rc2
OR
proftpdproftpdMatch1.3.2rc3
OR
proftpdproftpdMatch1.3.2rc4
OR
proftpdproftpdMatch1.3.3
OR
proftpdproftpdMatch1.3.3a
OR
proftpdproftpdMatch1.3.3b
OR
proftpdproftpdMatch1.3.3rc1
OR
proftpdproftpdMatch1.3.3rc2
OR
proftpdproftpdMatch1.3.3rc3
OR
proftpdproftpdMatch1.3.3rc4

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

8.1 High

AI Score

Confidence

High

0.256 Low

EPSS

Percentile

96.7%