Fedora 16 : proftpd-1.3.4b-5.fc16 (2013-0468)

Low Nessus Plugin ID 64366


The remote Fedora host is missing a security update.


Jann Horn reported that there is a possible race condition in the handling of the MKD/XMKD FTP commands, when the UserOwner directive is involved, and the attacker is on the same physical machine as a running proftpd. This race applies to mod_sftp and the handling of the MKDIR SFTP request as well.

Note that using the DefaultRoot directive to restrict sessions mitigates this attack, since the symlinks created by the local attacker will point outside of the chroot(2) area within the FTP session, and thus the ownership change will fail. The default configuration in Fedora applies the DefaultRoot directive to all users except 'adm'.

The upstream reference for this issue is:

This update includes upstream's backport to proftpd 1.3.4 of the fix for this issue.

Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.


Update the affected proftpd package.

See Also




Plugin Details

Severity: Low

ID: 64366

File Name: fedora_2013-0468.nasl

Version: $Revision: 1.5 $

Type: local

Agent: unix

Published: 2013/01/31

Modified: 2015/10/19

Dependencies: 12634

Risk Information

Risk Factor: Low


Base Score: 1.2

Vector: CVSS2#AV:L/AC:H/Au:N/C:N/I:P/A:N

Vulnerability Information

CPE: p-cpe:/a:fedoraproject:fedora:proftpd, cpe:/o:fedoraproject:fedora:16

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list

Patch Publication Date: 2013/01/09

Reference Information

CVE: CVE-2012-6095

FEDORA: 2013-0468