{"id":"CVE-2010-4652","details":"Heap-based buffer overflow in the sql_prepare_where function (contrib/mod_sql.c) in ProFTPD before 1.3.3d, when mod_sql is enabled, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted username containing substitution tags, which are not properly handled during construction of an SQL query.","modified":"2026-04-10T03:41:30.916722Z","published":"2011-02-02T01:00:04Z","references":[{"type":"ADVISORY","url":"http://www.debian.org/security/2011/dsa-2191"},{"type":"ADVISORY","url":"http://www.mandriva.com/security/advisories?name=MDVSA-2011:023"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2011/0248"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2011/0331"},{"type":"EVIDENCE","url":"http://bugs.proftpd.org/show_bug.cgi?id=3536"},{"type":"EVIDENCE","url":"https://bugzilla.redhat.com/show_bug.cgi?id=670170"},{"type":"FIX","url":"http://bugs.proftpd.org/show_bug.cgi?id=3536"},{"type":"FIX","url":"https://bugzilla.redhat.com/show_bug.cgi?id=670170"},{"type":"WEB","url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053537.html"},{"type":"WEB","url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053540.html"},{"type":"WEB","url":"http://phrack.org/issues.html?issue=67&id=7#article"},{"type":"WEB","url":"http://proftpd.org/docs/RELEASE_NOTES-1.3.3d"},{"type":"WEB","url":"http://www.securityfocus.com/bid/44933"}],"schema_version":"1.7.5"}