Korean
<< Back
VID 16144
Severity 40
Port 21, ...
Protocol TCP
Class FTP
Detailed Description According to its banner, the version of ProFTPD installed on the remote host is earlier than 1.3.3g or 1.3.4. As such, it is potentially affected by a code execution vulnerability due to how the server manages the response pool that is used to send responses from the server to the client. A remote, authenticated attacker could could leverage this issue to execute arbitrary code on the remote host, subject to the privileges of the user running the affected application.

* Note: This check solely relied on the banner of the remote FTP server to assess this vulnerability, so this might be a false positive.

* References:
http://www.zerodayinitiative.com/advisories/ZDI-11-328/
http://archives.neohapsis.com/archives/fulldisclosure/2011-11/0175.html
http://bugs.proftpd.org/show_bug.cgi?id=3711
http://www.proftpd.org/docs/NEWS-1.3.3g
http://www.proftpd.org/docs/NEWS-1.3.4

* Platforms Affected:
ProFTPD Project, ProFTPD versions prior to 1.3.3g / 1.3.4
Linux Any version
Unix Any version
Recommendation Upgrade to the latest version of ProFTPD (1.3.3g / 1.3.4 or later), available from the ProFTPD Web site at http://www.proftpd.org/
Related URL CVE-2011-4130 (CVE)
Related URL 50631 (SecurityFocus)
Related URL (ISS)