{"id":"CVE-2013-4359","details":"Integer overflow in kbdint.c in mod_sftp in ProFTPD 1.3.4d and 1.3.5r3 allows remote attackers to cause a denial of service (memory consumption) via a large response count value in an authentication request, which triggers a large memory allocation.","modified":"2026-02-04T04:02:19.738079Z","published":"2013-09-30T21:55:07Z","related":["MGASA-2013-0295","openSUSE-SU-2024:10048-1"],"references":[{"type":"ADVISORY","url":"http://www.debian.org/security/2013/dsa-2767"},{"type":"EVIDENCE","url":"http://kingcope.wordpress.com/2013/09/11/proftpd-mod_sftpmod_sftp_pam-invalid-pool-allocation-in-kbdint-authentication/"},{"type":"EVIDENCE","url":"http://www.openwall.com/lists/oss-security/2013/09/17/6"},{"type":"FIX","url":"http://bugs.proftpd.org/show_bug.cgi?id=3973"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-updates/2013-10/msg00032.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-updates/2015-06/msg00020.html"}],"schema_version":"1.7.3"}