ProFTPd: Memory Disclosure A vulnerability has been discovered in ProFTPd which could result in memory disclosure. proftpd 2023-05-03 2023-05-03 811495 remote 1.3.7c 1.3.7c

ProFTPD is an advanced and very configurable FTP server.

ProFTPd unconditionally sends passwords to Radius servers for authentication in multiples of 16 bytes. If a password is not of a length that is a multiple of 16 bytes, ProFTPd will read beyond the end of the password string and send bytes beyond the end of the string buffer.

Radius servers used for authentication can receive the contents of the ProFTPd process' memory.

There is no known workaround at this time.

All ProFTPd users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=net-ftp/proftpd-1.3.7c"
CVE-2021-46854 ajak sam