Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Wed, 15 Apr 2015 03:51:24 -0400 (EDT)
From: cve-assign@...re.org
To: hanno@...eck.de
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: proftpd: Unauthenticated copying of files via SITE CPFR/CPTO allowed by mod_copy

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> https://github.com/proftpd/proftpd/pull/109
> http://bugs.proftpd.org/show_bug.cgi?id=4169

Use CVE-2015-3306.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJVLhgVAAoJEKllVAevmvmsKHUH+waJx8nbkGoipax0DRtUXvOM
HEbdUkDVEwWge3J58tqU9SJErELAOV4oSk20RyRw6dyqVgnn0fxUihppBO/7g5bt
VP3wQODxp/QqROVynu913YeAUWEJhs+gyInfvpf5/HoPQzQBe6zegcGyRjUP7UsR
LMERS9msQbz+idq5pN8XGn49FeVJ1C0Tj55KY3t/e1gMDpe0c8Y2zl4JVPGHF7+5
EPCRvq5uc20ZldfbwrG/ctO1Sw87JKZjP6OXdTAXA4v9239E+mnX4TPFWSyueWCy
0q9sYBy1hCLgKxmcqr47FCs/7kJwf1gsM+z6yXRjOTBgnazX70ihq0G2IqbTcZs=
=OrPd
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ