Mandrake Linux Security Advisory : proftpd (MDKSA-2006:217-1)

Critical Nessus Plugin ID 24602


The remote Mandrake Linux host is missing one or more security updates.


A stack-based buffer overflow in the sreplace function in ProFTPD 1.3.0 and earlier, allows remote attackers to cause a denial of service, as demonstrated by, a 'ProFTPD remote exploit.' (CVE-2006-5815)

Buffer overflow in the tls_x509_name_oneline function in the mod_tls module, as used in ProFTPD 1.3.0a and earlier, and possibly other products, allows remote attackers to execute arbitrary code via a large data length argument, a different vulnerability than CVE-2006-5815. (CVE-2006-6170)

ProFTPD 1.3.0a and earlier does not properly set the buffer size limit when CommandBufferSize is specified in the configuration file, which leads to an off-by-two buffer underflow. NOTE: in November 2006, the role of CommandBufferSize was originally associated with CVE-2006-5815, but this was an error stemming from an initial vague disclosure. NOTE: ProFTPD developers dispute this issue, saying that the relevant memory location is overwritten by assignment before further use within the affected function, so this is not a vulnerability. (CVE-2006-6171)

Packages have been patched to correct these issues.

Update :

The previous update incorrectly linked the issue with the CommandBufferSize issue. These are two distinct issues and the previous update only addressed CommandBufferSize (CVE-2006-6171), and the mod_tls issue (CVE-2006-6170).


Update the affected packages.

Plugin Details

Severity: Critical

ID: 24602

File Name: mandrake_MDKSA-2006-217.nasl

Version: $Revision: 1.15 $

Type: local

Published: 2007/02/18

Modified: 2013/05/31

Dependencies: 12634

Risk Information

Risk Factor: Critical


Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:proftpd, p-cpe:/a:mandriva:linux:proftpd-anonymous, p-cpe:/a:mandriva:linux:proftpd-mod_autohost, p-cpe:/a:mandriva:linux:proftpd-mod_case, p-cpe:/a:mandriva:linux:proftpd-mod_clamav, p-cpe:/a:mandriva:linux:proftpd-mod_ctrls_admin, p-cpe:/a:mandriva:linux:proftpd-mod_facl, p-cpe:/a:mandriva:linux:proftpd-mod_gss, p-cpe:/a:mandriva:linux:proftpd-mod_ifsession, p-cpe:/a:mandriva:linux:proftpd-mod_ldap, p-cpe:/a:mandriva:linux:proftpd-mod_load, p-cpe:/a:mandriva:linux:proftpd-mod_quotatab, p-cpe:/a:mandriva:linux:proftpd-mod_quotatab_file, p-cpe:/a:mandriva:linux:proftpd-mod_quotatab_ldap, p-cpe:/a:mandriva:linux:proftpd-mod_quotatab_sql, p-cpe:/a:mandriva:linux:proftpd-mod_radius, p-cpe:/a:mandriva:linux:proftpd-mod_ratio, p-cpe:/a:mandriva:linux:proftpd-mod_rewrite, p-cpe:/a:mandriva:linux:proftpd-mod_shaper, p-cpe:/a:mandriva:linux:proftpd-mod_site_misc, p-cpe:/a:mandriva:linux:proftpd-mod_sql, p-cpe:/a:mandriva:linux:proftpd-mod_sql_mysql, p-cpe:/a:mandriva:linux:proftpd-mod_sql_postgres, p-cpe:/a:mandriva:linux:proftpd-mod_time, p-cpe:/a:mandriva:linux:proftpd-mod_tls, p-cpe:/a:mandriva:linux:proftpd-mod_wrap, p-cpe:/a:mandriva:linux:proftpd-mod_wrap_file, p-cpe:/a:mandriva:linux:proftpd-mod_wrap_sql, cpe:/o:mandriva:linux:2006, cpe:/o:mandriva:linux:2007

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2006/11/30

Exploitable With

Metasploit (ProFTPD 1.2 - 1.3.0 sreplace Buffer Overflow (Linux))

Reference Information

CVE: CVE-2006-5815, CVE-2006-6170, CVE-2006-6171

BID: 20992

MDKSA: 2006:217-1

CWE: 119