ProFTPD < 1.3.3g / 1.3.4 Response Pool Use-After-Free Code Execution

This script is Copyright (C) 2011-2016 Tenable Network Security, Inc.

Synopsis :

The remote FTP server is affected by a code execution vulnerability.

Description :

The remote host is using ProFTPD, a free FTP server for Unix and

According to its banner, the version of ProFTPD installed on the
remote host is earlier than 1.3.3g or 1.3.4. As such, it is
potentially affected by a code execution vulnerability due to how the
server manages the response pool that is used to send responses from
the server to the client. A remote, authenticated attacker could could
leverage this issue to execute arbitrary code on the remote host,
subject to the privileges of the user running the affected

Note that Nessus did not actually test for the flaw but instead has
relied on the version in ProFTPD's banner.

See also :

Solution :

Upgrade to ProFTPD version 1.3.3g / 1.3.4 or later.

Risk factor :

High / CVSS Base Score : 9.0
CVSS Temporal Score : 7.8
Public Exploit Available : false

Family: FTP

Nessus Plugin ID: 56956 ()

Bugtraq ID: 50631

CVE ID: CVE-2011-4130

Ready to Scan Unlimited IPs & Run Compliance Checks?

Upgrade to Nessus Professional today!

Buy Now

Combine the Power of Nessus with the Ease of Cloud

Start your free Nessus Cloud trial now!

Begin Free Trial