FTP Service AUTH TLS Plaintext Command Injection

This script is Copyright (C) 2011-2016 Tenable Network Security, Inc.


Synopsis :

The remote FTP server allows plaintext command injection while
negotiating an encrypted communications channel.

Description :

The remote FTP server contains a software flaw in its AUTH TLS
implementation that could allow a remote, unauthenticated attacker to
inject commands during the plaintext protocol phase that will be
executed during the ciphertext protocol phase.

Successful exploitation could permit an attacker to modify files on
the FTP server and reveal a user's credentials.

See also :

http://tools.ietf.org/html/rfc4217
http://www.securityfocus.com/archive/1/516901/30/0/threaded

Solution :

Contact the vendor to see if an update is available.

Risk factor :

Medium / CVSS Base Score : 5.8
(CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N)
CVSS Temporal Score : 5.0
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

Family: FTP

Nessus Plugin ID: 53847 ()

Bugtraq ID: 46767

CVE ID: CVE-2011-1575

Ready to Scan Unlimited IPs & Run Compliance Checks?

Upgrade to Nessus Professional today!

Buy Now

Combine the Power of Nessus with the Ease of Cloud

Start your free Nessus Cloud trial now!

Begin Free Trial