| VID |
16141 |
| Severity |
40 |
| Port |
21, ... |
| Protocol |
TCP |
| Class |
FTP |
| Detailed Description |
According to its banner, the version of ProFTPD installed on the remote host is earlier than 1.3.3c. Such versions are reportedly affected by the following vulnerabilities :
- When ProFTPD is compiled with 'mod_site_misc' and a directory is writable, a user can use 'mod_site_misc' to create or delete a directory outside the writable directory, create a symlink located outside the writable directory, or change the time of a file located outside the writable directory. (Bug #3519)
- A stack-based buffer overflow exists in the server's 'pr_netio_telnet_gets()' function, which can be triggered by when reading user input containing a TELNET_IAC escape sequence. (Bug #3521)
* Note: This check solely relied on the banner of the remote FTP server to assess this vulnerability, so this might be a false positive.
* References: http://www.zerodayinitiative.com/advisories/ZDI-10-229/ http://bugs.proftpd.org/show_bug.cgi?id=3519 http://bugs.proftpd.org/show_bug.cgi?id=3521 http://www.proftpd.org/docs/RELEASE_NOTES-1.3.3c
* Platforms Affected: ProFTPD Project, ProFTPD versions prior to 1.3.3c Linux Any version Unix Any version |
| Recommendation |
Upgrade to the latest version of ProFTPD (1.3.3c or later), available from the ProFTPD Web site at http://www.proftpd.org/ |
| Related URL |
CVE-2010-3867 (CVE) |
| Related URL |
44562 (SecurityFocus) |
| Related URL |
(ISS) |
|