ProFTPD on Debian Linux postinst Installation Privilege Escalation

medium Nessus Plugin ID 11450

Language:

Synopsis

The remote FTP server is affected by several flaws.

Description

The following problems have been reported for the version of proftpd in Debian 2.2 (potato):

1. There is a configuration error in the postinst script, when the user enters 'yes', when asked if anonymous access should be enabled. The postinst script wrongly leaves the 'run as uid/gid root' configuration option in /etc/proftpd.conf, and adds a 'run as uid/gid nobody' option that has no effect.
2. There is a bug that comes up when /var is a symlink, and proftpd is restarted. When stopping proftpd, the /var symlink is removed; when it's started again a file named /var is created.

Solution

Upgrade your proftpd server to proftpd-1.2.0pre10-2.0potato1

Plugin Details

Severity: Medium

ID: 11450

File Name: proftpd_debian.nasl

Version: 1.12

Type: remote

Family: FTP

Published: 3/23/2003

Updated: 8/13/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Medium

Base Score: 5.8

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:P

Vulnerability Information

CPE: cpe:/a:proftpd:proftpd

Required KB Items: ftp/proftpd

Vulnerability Publication Date: 3/7/2001

Reference Information

CVE: CVE-2001-0456

DSA: 032