{"id":"MGASA-2013-0295","summary":"Updated proftpd package fixes security vulnerability","details":"A bug in ProFTPd's mod_sftp and mod_sftp_pam modules can be used to\ntrigger a large heap allocation and exhaust all available system memory of\nthe underlying operating system (CVE-2013-4359).\n","modified":"2026-02-04T02:17:56.880671Z","published":"2013-10-05T17:58:23Z","related":["CVE-2013-4359"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2013-0295.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=11282"},{"type":"REPORT","url":"https://lists.fedoraproject.org/pipermail/package-announce/2013-September/116668.html"}],"affected":[{"package":{"name":"proftpd","ecosystem":"Mageia:2","purl":"pkg:rpm/mageia/proftpd?arch=source&distro=mageia-2"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.3.3g-1.3.mga2"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2013-0295.json"}},{"package":{"name":"proftpd","ecosystem":"Mageia:3","purl":"pkg:rpm/mageia/proftpd?arch=source&distro=mageia-3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.3.4c-2.1.mga3"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2013-0295.json"}}],"schema_version":"1.7.3","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}