HP-UX ftpd PAM Authentication Configuration Weakness Authentication Bypass

high Nessus Plugin ID 33899
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.


The remote ftp server may allow remote privileged access.


According to its banner, the version of the HP-UX FTP server running on the remote host is at a patch level before PHNE_38458. Such versions reportedly contain a vulnerability that in certain account configurations could be exploited by an anonymous remote attacker to gain privileged access.

Note that successful exploitation requires that pam is used for authenticating FTP users and that pam authentication passes when a user tries to log in while getpwnam returns NULL. This could occur, for example, if LDAP is used for pam authentication, the nsswitch.conf file does not include 'ldap' as a source for the 'passwd' database, and the attacker tries to log in with a username included in the LDAP directory.


Apply patch PHNE_38458 or later.

See Also




Plugin Details

Severity: High

ID: 33899

File Name: hpux_ftpd_priv_escalation.nasl

Version: 1.16

Type: remote

Family: FTP

Published: 8/15/2008

Updated: 1/11/2021

Dependencies: ftpserver_detect_type_nd_version.nasl

Risk Information


Risk Factor: Medium

Score: 5.9


Risk Factor: High

Base Score: 7.6

Temporal Score: 5.6

Vector: CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:2.3:o:hp:hp-ux:*:*:*:*:*:*:*:*

Exploit Ease: No known exploits are available

Reference Information

CVE: CVE-2008-1668

BID: 30666

CWE: 264

Secunia: 31471