ProFTPD File Transfer Newline Character Overflow

high Nessus Plugin ID 11849

Synopsis

Arbitrary code may be run on the remote server.

Description

The remote host is running a version of ProFTPD which seems to be vulnerable to a buffer overflow when a user downloads a malformed ASCII file.

An attacker with upload privileges on this host may abuse this flaw to gain a root shell on this host.

*** The author of ProFTPD did not increase the version number
*** of his product when fixing this issue, so it might be false
*** positive.

Solution

Upgrade to ProFTPD 1.2.9 when available or to 1.2.8p

Plugin Details

Severity: High

ID: 11849

File Name: proftpd_ascii_overflow.nasl

Version: 1.17

Type: remote

Family: FTP

Published: 9/23/2003

Updated: 7/25/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 9

Temporal Score: 7

Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:proftpd:proftpd

Required KB Items: ftp/proftpd

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 9/23/2003

Reference Information

CVE: CVE-2003-0831

BID: 8679

CWE: 119