GProFTPD: gprostats format string vulnerability — GLSA 200502-26

gprostats, distributed with GProFTPD, is vulnerable to a format string vulnerability, potentially leading to the execution of arbitrary code.

Affected packages

net-ftp/gproftpd on all architectures
Affected versions < 8.1.9
Unaffected versions >= 8.1.9

Background

GProFTPD is a GTK+ administration tool for the ProFTPD server. GProFTPD is distributed with gprostats, a utility to parse ProFTPD transfer logs.

Description

Tavis Ormandy of the Gentoo Linux Security Audit Team has identified a format string vulnerability in the gprostats utility.

Impact

An attacker could exploit the vulnerability by performing a specially crafted FTP transfer, the resulting ProFTPD transfer log could potentially trigger the execution of arbitrary code when parsed by GProFTPD.

Workaround

There is no known workaround at this time.

Resolution

All GProFTPD users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=net-ftp/gproftpd-8.1.9"

References

Release date
February 18, 2005

Latest revision
May 22, 2006: 02

Severity
normal

Exploitable
remote

Bugzilla entries