ProFTPD < 1.3.3g / 1.3.4 Response Pool Use-After-Free Code Execution

This script is Copyright (C) 2011-2014 Tenable Network Security, Inc.


Synopsis :

The remote FTP server is affected by a code execution vulnerability.

Description :

The remote host is using ProFTPD, a free FTP server for Unix and
Linux.

According to its banner, the version of ProFTPD installed on the
remote host is earlier than 1.3.3g or 1.3.4. As such, it is
potentially affected by a code execution vulnerability due to how the
server manages the response pool that is used to send responses from
the server to the client. A remote, authenticated attacker could could
leverage this issue to execute arbitrary code on the remote host,
subject to the privileges of the user running the affected
application.

Note that Nessus did not actually test for the flaw but instead has
relied on the version in ProFTPD's banner.

See also :

http://www.zerodayinitiative.com/advisories/ZDI-11-328/
http://archives.neohapsis.com/archives/fulldisclosure/2011-11/0175.html
http://bugs.proftpd.org/show_bug.cgi?id=3711
http://www.proftpd.org/docs/NEWS-1.3.3g
http://www.proftpd.org/docs/NEWS-1.3.4

Solution :

Upgrade to ProFTPD version 1.3.3g / 1.3.4 or later.

Risk factor :

High / CVSS Base Score : 9.0
(CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C)
CVSS Temporal Score : 6.7
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Family: FTP

Nessus Plugin ID: 56956 ()

Bugtraq ID: 50631

CVE ID: CVE-2011-4130