Korean
<< Back
VID 16041
Severity 20
Port 21
Protocol TCP
Class FTP
Detailed Description The ProFTPd is vulnerable to a Denial of Service attack via specially crafted 'ls' command.
Many vulnerabilities caused by a poor globbing algorithms. This vulnerability arises when a remote attacker sends several "Is" commands followed by specially-crafted "dot dot" sequences (such as (*/../*/) or (.*./*?/)). It is possible for the server to starts to consume all CPU and memory resources available to it. If multiple simultaneous connections are allowed, it will take 100% CPU time and memory resources on the server and cause the server or the FTP daemon to crash.

You can test this vulnerability by issuing the commands as the following:

ls */../*/../*/../*/../*/../*/../*/../*/../*/../*/../*/../*/../*
ls */.*/*/.*/*/.*/*/.*/*/.*/*/.*/*/.*/*/.*/*/.*/*/.*/*/.*/*/.*/
ls .*./*?/.*./*?/.*./*?/.*./*?/.*./*?/.*./*?/.*./*?/.*./*?/.*./*?/

* Platforms Affected :
ProFTPD versions 1.2.1 and earlier
Recommendation Upgrade to the latest version of ProFTPD (1.2.5rc1 or later), available from the ProFTPD Web site, http://www.proftpd.org/
Now the latest version, ProFTPD 1.2.8rc1, has just been released on the Dec 28, 2002.

As the workaround, add the following directive in proftpd.conf:
"DenyFilter /\*/\.\."
Related URL CVE-2001-1501 (CVE)
Related URL 2496,6341 (SecurityFocus)
Related URL 7818 (ISS)