Multiple stack-based buffer overflows in the pr_netio_telnet_gets function in netio.c in ProFTPD before 1.3.3c allow remote attackers to execute arbitrary code via vectors involving a TELNET IAC escape character to a (1) FTP or (2) FTPS server.
http://www.zerodayinitiative.com/advisories/ZDI-10-229/
http://www.vupen.com/english/advisories/2010/2962
http://www.vupen.com/english/advisories/2010/2959
http://www.vupen.com/english/advisories/2010/2941
http://www.proftpd.org/docs/NEWS-1.3.3c
http://www.mandriva.com/security/advisories?name=MDVSA-2010:227
http://secunia.com/advisories/42217
http://secunia.com/advisories/42052
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050726.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050703.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050687.html