A vulnerability has been discovered in ProFTPd which could result in memory disclosure.
| Package | net-ftp/proftpd on all architectures | 
|---|---|
| Affected versions | < 1.3.7c | 
| Unaffected versions | >= 1.3.7c | 
ProFTPD is an advanced and very configurable FTP server.
ProFTPd unconditionally sends passwords to Radius servers for authentication in multiples of 16 bytes. If a password is not of a length that is a multiple of 16 bytes, ProFTPd will read beyond the end of the password string and send bytes beyond the end of the string buffer.
Radius servers used for authentication can receive the contents of the ProFTPd process' memory.
There is no known workaround at this time.
All ProFTPd users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-ftp/proftpd-1.3.7c"
      Release date
      
      May 03, 2023
    
      Latest revision
      
      May 03, 2023: 1
    
      Severity
      
      low
    
      Exploitable
      
      remote
    
Bugzilla entries