Fedora 13 : proftpd-1.3.3c-1.fc13 (2010-17098)

This script is Copyright (C) 2010-2016 Tenable Network Security, Inc.


Synopsis :

The remote Fedora host is missing a security update.

Description :

This is an update to the current upstream maintenance release, which
addresses two security issues that can be exploited by malicious users
to manipulate certain data and compromise a vulnerable system.

- A logic error in the code for processing user input
containing the Telnet IAC (Interpret As Command) escape
sequence can be exploited to cause a stack-based buffer
overflow by sending specially crafted input to the FTP
or FTPS service. Successful exploitation may allow
execution of arbitrary code. This has been assigned the
name CVE-2010-4221. More details can be found at
http://bugs.proftpd.org/show_bug.cgi?id=3521

- An input validation error within the 'mod_site_misc'
module can be exploited to e.g. create and delete
directories, create symlinks, and change the time of
files located outside a writable directory. Only
configurations using 'mod_site_misc', which is not
enabled by default, and where the attacker has write
access to a directory, are vulnerable to this issue,
which has been assigned CVE-2010-3867. More details can
be found at http://bugs.proftpd.org/show_bug.cgi?id=3519

This update also fixes an issue with SQLite authentication and adds a
new module 'mod_geoip', which can be used to look up geographical
information on connecting clients and use that to set access controls
for the server.

Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.

See also :

http://bugs.proftpd.org/show_bug.cgi?id=3519
http://bugs.proftpd.org/show_bug.cgi?id=3521
https://bugzilla.redhat.com/show_bug.cgi?id=651602
https://bugzilla.redhat.com/show_bug.cgi?id=651607
http://www.nessus.org/u?26f3558a

Solution :

Update the affected proftpd package.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 8.7
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

Family: Fedora Local Security Checks

Nessus Plugin ID: 50553 ()

Bugtraq ID: 44562

CVE ID: CVE-2010-3867
CVE-2010-4221

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now