Globus Toolkit GridFTP Server < 3.42 / 6.11 'getpwnam_r()' Authentication Bypass Vulnerability

This script is Copyright (C) 2012-2014 Tenable Network Security, Inc.


Synopsis :

The remote FTP service is vulnerable to an authentication bypass
attack.

Description :

According to its self-reported version number, the remote FTP server
is running a version of GridFTP Server earlier than 3.42 / 6.11. Such
versions reportedly are affected by an authentication bypass
vulnerability caused by incorrect use of 'getpwnam_r()'. When a
'gridmap' file is improperly configured with a valid user DN mapped to
a nonexistent user account, the GridFTP server may grant access to the
client under another account.

See also :

http://jira.globus.org/browse/GT-195
http://lists.globus.org/pipermail/security-announce/2012-May/000019.html

Solution :

Upgrade to version 3.42 / 6.11 or later.

Risk factor :

High / CVSS Base Score : 8.8
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:N)
CVSS Temporal Score : 7.3
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: FTP

Nessus Plugin ID: 59734 ()

Bugtraq ID: 53778

CVE ID: CVE-2012-3292