ProFTPD < 1.3.3g / 1.3.4 Response Pool Use-After-Free Code Execution

This script is Copyright (C) 2011-2017 Tenable Network Security, Inc.

Synopsis :

The remote FTP server is affected by a code execution vulnerability.

Description :

The remote host is using ProFTPD, a free FTP server for Unix and

According to its banner, the version of ProFTPD installed on the
remote host is earlier than 1.3.3g or 1.3.4. As such, it is
potentially affected by a code execution vulnerability due to how the
server manages the response pool that is used to send responses from
the server to the client. A remote, authenticated attacker could could
leverage this issue to execute arbitrary code on the remote host,
subject to the privileges of the user running the affected

Note that Nessus did not actually test for the flaw but instead has
relied on the version in ProFTPD's banner.

See also :

Solution :

Upgrade to ProFTPD version 1.3.3g / 1.3.4 or later.

Risk factor :

High / CVSS Base Score : 9.0
CVSS Temporal Score : 7.8
Public Exploit Available : false

Family: FTP

Nessus Plugin ID: 56956 ()

Bugtraq ID: 50631

CVE ID: CVE-2011-4130

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now