| VID |
16144 |
| Severity |
40 |
| Port |
21, ... |
| Protocol |
TCP |
| Class |
FTP |
| Detailed Description |
According to its banner, the version of ProFTPD installed on the remote host is earlier than 1.3.3g or 1.3.4. As such, it is potentially affected by a code execution vulnerability due to how the server manages the response pool that is used to send responses from the server to the client. A remote, authenticated attacker could could leverage this issue to execute arbitrary code on the remote host, subject to the privileges of the user running the affected application.
* Note: This check solely relied on the banner of the remote FTP server to assess this vulnerability, so this might be a false positive.
* References: http://www.zerodayinitiative.com/advisories/ZDI-11-328/ http://archives.neohapsis.com/archives/fulldisclosure/2011-11/0175.html http://bugs.proftpd.org/show_bug.cgi?id=3711 http://www.proftpd.org/docs/NEWS-1.3.3g http://www.proftpd.org/docs/NEWS-1.3.4
* Platforms Affected: ProFTPD Project, ProFTPD versions prior to 1.3.3g / 1.3.4 Linux Any version Unix Any version |
| Recommendation |
Upgrade to the latest version of ProFTPD (1.3.3g / 1.3.4 or later), available from the ProFTPD Web site at http://www.proftpd.org/ |
| Related URL |
CVE-2011-4130 (CVE) |
| Related URL |
50631 (SecurityFocus) |
| Related URL |
(ISS) |
|