Mandriva Linux Security Advisory : proftpd (MDVSA-2010:227)

Critical Nessus Plugin ID 50571

Synopsis

The remote Mandriva Linux host is missing one or more security updates.

Description

Multiple vulnerabilities were discovered and corrected in proftpd :

Multiple directory traversal vulnerabilities in the mod_site_misc module in ProFTPD before 1.3.3c allow remote authenticated users to create directories, delete directories, create symlinks, and modify file timestamps via directory traversal sequences in a (1) SITE MKDIR, (2) SITE RMDIR, (3) SITE SYMLINK, or (4) SITE UTIME command (CVE-2010-3867).

Multiple stack-based buffer overflows in the pr_netio_telnet_gets function in netio.c in ProFTPD before 1.3.3c allow remote attackers to execute arbitrary code via vectors involving a TELNET IAC escape character to a (1) FTP or (2) FTPS server (CVE-2010-4221).

Packages for 2009.0 are provided as of the Extended Maintenance Program. Please visit this link to learn more:
http://store.mandriva.com/product_info.php?cPath=149&products_id=4 90

The updated packages have been patched to correct these issues.

Solution

Update the affected packages.

Plugin Details

Severity: Critical

ID: 50571

File Name: mandriva_MDVSA-2010-227.nasl

Version: 1.12

Type: local

Published: 2010/11/12

Updated: 2019/01/02

Dependencies: 12634

Risk Information

Risk Factor: Critical

CVSS v2.0

Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:proftpd, p-cpe:/a:mandriva:linux:proftpd-devel, p-cpe:/a:mandriva:linux:proftpd-mod_autohost, p-cpe:/a:mandriva:linux:proftpd-mod_ban, p-cpe:/a:mandriva:linux:proftpd-mod_case, p-cpe:/a:mandriva:linux:proftpd-mod_ctrls_admin, p-cpe:/a:mandriva:linux:proftpd-mod_gss, p-cpe:/a:mandriva:linux:proftpd-mod_ifsession, p-cpe:/a:mandriva:linux:proftpd-mod_ldap, p-cpe:/a:mandriva:linux:proftpd-mod_load, p-cpe:/a:mandriva:linux:proftpd-mod_quotatab, p-cpe:/a:mandriva:linux:proftpd-mod_quotatab_file, p-cpe:/a:mandriva:linux:proftpd-mod_quotatab_ldap, p-cpe:/a:mandriva:linux:proftpd-mod_quotatab_radius, p-cpe:/a:mandriva:linux:proftpd-mod_quotatab_sql, p-cpe:/a:mandriva:linux:proftpd-mod_radius, p-cpe:/a:mandriva:linux:proftpd-mod_ratio, p-cpe:/a:mandriva:linux:proftpd-mod_rewrite, p-cpe:/a:mandriva:linux:proftpd-mod_sftp, p-cpe:/a:mandriva:linux:proftpd-mod_shaper, p-cpe:/a:mandriva:linux:proftpd-mod_site_misc, p-cpe:/a:mandriva:linux:proftpd-mod_sql, p-cpe:/a:mandriva:linux:proftpd-mod_sql_mysql, p-cpe:/a:mandriva:linux:proftpd-mod_sql_postgres, p-cpe:/a:mandriva:linux:proftpd-mod_time, p-cpe:/a:mandriva:linux:proftpd-mod_tls, p-cpe:/a:mandriva:linux:proftpd-mod_vroot, p-cpe:/a:mandriva:linux:proftpd-mod_wrap, p-cpe:/a:mandriva:linux:proftpd-mod_wrap_file, p-cpe:/a:mandriva:linux:proftpd-mod_wrap_sql, cpe:/o:mandriva:linux:2009.0, cpe:/o:mandriva:linux:2009.1, cpe:/o:mandriva:linux:2010.0, cpe:/o:mandriva:linux:2010.1

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2010/11/11

Exploitable With

Core Impact

Metasploit (ProFTPD 1.3.2rc3 - 1.3.3b Telnet IAC Buffer Overflow (Linux))

Reference Information

CVE: CVE-2010-3867, CVE-2010-4221

BID: 44562

MDVSA: 2010:227