From secunia security advisory at $URL:
The vulnerability is caused due to a use-after-free error when handling response pool allocation lists and can be exploited to corrupt memory.
Successful exploitation may allow execution of arbitrary code.
The vulnerability is reported in versions prior to 1.3.3g.
Update to version 1.3.3g or 1.3.4.
Upstream bug: http://bugs.proftpd.org/show_bug.cgi?id=3711
According to http://www.gentoo.org/security/en/vulnerability-policy.xml, B1 is correct.
@Maintainers: please provide an updated ebuild soonish.
(In reply to comment #1)
> According to http://www.gentoo.org/security/en/vulnerability-policy.xml, B1 is
Sorry for the misunderstanding.
1.3.3g and 1.3.4 are in tree now, and vulnerable 1.3.4_rc3 removed.
1.3.3g is the target version for stabling, target keywords "alpha amd64 hppa ppc ppc64 sparc x86"
well, thank you.
Arches, please test and mark stable:
Target keywords : "alpha amd64 hppa ppc ppc64 sparc x86"
Stable for HPPA.
+ 16 Nov 2011; Tony Vroon <email@example.com> proftpd-1.3.3g.ebuild:
+ Marked stable on AMD64 based on arch testing by Agostino "ago" Sarubbo &
+ Elijah "Armageddon" El Lazkani in security bug #390075.
Use-after-free vulnerability in the Response API in ProFTPD before 1.3.3g
allows remote authenticated users to execute arbitrary code via vectors
involving an error that occurs after an FTP data transfer.
thanks everyone, add to existing glsa request.
This issue was resolved and addressed in
GLSA 201309-15 at http://security.gentoo.org/glsa/glsa-201309-15.xml
by GLSA coordinator Sean Amoss (ackle).