FreeBSD : proftpd -- arbitrary code execution vulnerability with chroot (d0034536-ff24-11e4-a072-d050996490d0)

Critical Nessus Plugin ID 83752


The remote FreeBSD host is missing a security-related update.


ProFTPd development team reports :

Vadim Melihow reported a critical issue with proftpd installations that use the mod_copy module's SITE CPFR/SITE CPTO commands; mod_copy allows these commands to be used by *unauthenticated clients*.


Update the affected package.

See Also

Plugin Details

Severity: Critical

ID: 83752

File Name: freebsd_pkg_d0034536ff2411e4a072d050996490d0.nasl

Version: $Revision: 2.3 $

Type: local

Published: 2015/05/21

Modified: 2015/11/16

Dependencies: 12634

Risk Information

Risk Factor: Critical


Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:proftpd, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2015/05/20

Vulnerability Publication Date: 2015/04/15

Exploitable With


Metasploit (ProFTPD 1.3.5 Mod_Copy Command Execution)

Reference Information

CVE: CVE-2015-3306