freeFTPd / freeSSHd SFTP Authentication Bypass

This script is Copyright (C) 2012-2014 Tenable Network Security, Inc.


Synopsis :

The SFTP server running on the remote host has an authentication bypass
vulnerability.

Description :

The SFTP server included with freeFTPd or freeSSHd has an
authentication bypass vulnerability. Authentication can be bypassed by
opening an SSH channel before any credentials are provided. A remote,
unauthenticated attacker could exploit this to login without providing
credentials.

After logging in, uploading specially crafted files could result in
arbitrary code execution as SYSTEM. Refer to the researcher's advisory
for more information.

See also :

http://archives.neohapsis.com/archives/fulldisclosure/2010-08/0133.html
http://archives.neohapsis.com/archives/fulldisclosure/2012-12/0011.html
http://archives.neohapsis.com/archives/fulldisclosure/2012-12/0012.html

Solution :

There is no known solution at this time.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVSS Temporal Score : 7.1
(CVSS2#E:F/RL:U/RC:ND)
Public Exploit Available : true

Family: Gain a shell remotely

Nessus Plugin ID: 63223 ()

Bugtraq ID: 56782
56785

CVE ID: CVE-2012-6066
CVE-2012-6067