It was discovered that there was a use-after-free vulnerability in in the proftpd-dfsg FTP server.
Exploitation of this vulnerability within the memory pool handling could have allowed a remote attacker to execute arbitrary code on the affected system.
In ProFTPD 1.3.7, it is possible to corrupt the memory pool by interrupting the data transfer channel. This triggers a use-after-free in alloc_pool in pool.c, and possible remote code execution.
For Debian 8 Jessie
, these problems have been fixed in version
1.3.5e+r1.3.5-2+deb8u6.
We recommend that you upgrade your proftpd-dfsg packages.
Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS