DescriptionProFTPD 1.3.7 has an out-of-bounds (OOB) read vulnerability in mod_cap via the cap_text.c cap_to_text function.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severitymedium

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
proftpd-dfsg (PTS)stretch1.3.5b-4+deb9u5vulnerable
stretch (security)1.3.5e+r1.3.5b-4+deb9u2vulnerable
buster (security)1.3.6-4+deb10u4vulnerable
bullseye, sid1.3.7a+dfsg-12fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs

Debian does not build mod_cap and does not use the embedded libcap.
Sourcewise fixed in 1.3.6c by updating to the lastest libcap.

Search for package or bug name: Reporting problems