Korean
<< Back
VID 16129
Severity 40
Port 21, ...
Protocol TCP
Class FTP
Detailed Description A version of ProFTPD FTP Server which is older than version 1.3.0a is detected as running on the host. ProFTPD is a free available FTP server for Unix-based operating systems. ProFTPD versions prior to 1.3.0a are vulnerable to a stack-based buffer overflow vulnerability, caused by improper bounds checking by the sreplace function. A remote attacker could exploit this vulnerability to execute arbitrary code on the host or cause the affected server to crash.

* Note: This check solely relied on the banner of the remote FTP server to assess this vulnerability, so this might be a false positive.

* References:
http://archives.neohapsis.com/archives/bugtraq/2006-11/0095.html
http://www.securityfocus.com/archive/1/452760/30/0/threaded
http://www.frsirt.com/english/advisories/2006/4451
http://securitytracker.com/alerts/2006/Nov/1017167.html
http://secunia.com/advisories/22803

* Platforms Affected:
ProFTPD Project, ProFTPD versions prior to 1.3.0a
Linux Any version
Unix Any version
Recommendation Upgrade to the latest version of ProFTPD (1.3.0a or later), available from the ProFTPD Web site at http://www.proftpd.org/

For Gentoo Linux:
Upgrade to the fixed version of proftpd, as listed in Gentoo Linux Security Announcement GLSA 200611-26 at http://www.gentoo.org/security/en/glsa/glsa-200611-26.xml

For Debian Linux:
Upgrade to the fixed version of proftpd package, as listed in Debian Security Advisory DSA-1222-2 at http://www.us.debian.org/security/2006/dsa-1222

For other distributions:
Contact your vendor for upgrade or patch information.
Related URL CVE-2006-5815 (CVE)
Related URL 20992 (SecurityFocus)
Related URL 30147 (ISS)