{"id":"CVE-2006-6563","details":"Stack-based buffer overflow in the pr_ctrls_recv_request function in ctrls.c in the mod_ctrls module in ProFTPD before 1.3.1rc1 allows local users to execute arbitrary code via a large reqarglen length value.","modified":"2026-04-10T03:37:53.490774Z","published":"2006-12-15T11:28:00Z","references":[{"type":"ADVISORY","url":"http://secunia.com/advisories/23371"},{"type":"ADVISORY","url":"http://secunia.com/advisories/23392"},{"type":"ADVISORY","url":"http://secunia.com/advisories/23473"},{"type":"ADVISORY","url":"http://secunia.com/advisories/24163"},{"type":"ADVISORY","url":"http://security.gentoo.org/glsa/glsa-200702-02.xml"},{"type":"ADVISORY","url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:232"},{"type":"ADVISORY","url":"http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.039.html"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2006/4998"},{"type":"EVIDENCE","url":"http://secunia.com/advisories/23371"},{"type":"EVIDENCE","url":"http://www.coresecurity.com/?module=ContentMod&action=item&id=1594"},{"type":"EVIDENCE","url":"http://www.securityfocus.com/bid/21587"},{"type":"FIX","url":"http://secunia.com/advisories/23371"},{"type":"FIX","url":"http://www.coresecurity.com/?module=ContentMod&action=item&id=1594"},{"type":"FIX","url":"http://www.securityfocus.com/bid/21587"},{"type":"WEB","url":"http://www.proftpd.org/docs/NEWS-1.3.1rc1"},{"type":"WEB","url":"http://www.securityfocus.com/archive/1/454320/100/0/threaded"},{"type":"WEB","url":"http://www.securityfocus.com/archive/1/460648/100/0/threaded"},{"type":"WEB","url":"http://www.securityfocus.com/archive/1/460756/100/0/threaded"},{"type":"WEB","url":"http://www.trustix.org/errata/2006/0074/"},{"type":"WEB","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/30906"},{"type":"WEB","url":"https://www.exploit-db.com/exploits/3330"}],"schema_version":"1.7.5"}