Hi guys, The version of proftp that is in debian potato (1.2.0pre10 as reported by running 'proftpd -v ') is vulnerable to a glob DoS attack, as discovered on the 15th March 2001. You can verify this bug by logging in to a server running debian stable's proftpd and type "ls */../*/../*/../*/../*/../*/../*/../*/../*/../*/../*/../*/../*". This results with 100% of the CPU and memory resources being consumed (more info at http://proftpd.linux.co.uk/critbugs.html), A temporary workaround for this issue is to add DenyFilter \*.*/ into your proftp configuration file. I notifed security@debian.org on the 12th of February (2002) about this problem and a discussion was entered into but no resolution occurred. I contacted security@debian.org again on the 21st of FEbruary and didn't receive a reply. After posting to vuln-dev@securityfocus.com on the 1st of March, I was told on the 7th of March that the package maintainer was working on a fix. Now, over a year after the bug has been discovered, and over 5 weeks since I first contacted debian about it, no fix is in place in debian potato. Hopefully posting here will speed things up a bit. Regards, Joe Dollard