FreeBSD : proftpd -- arbitrary code execution vulnerability with chroot (d0034536-ff24-11e4-a072-d050996490d0)

critical Nessus Plugin ID 83752

Synopsis

The remote FreeBSD host is missing a security-related update.

Description

ProFTPd development team reports :

Vadim Melihow reported a critical issue with proftpd installations that use the mod_copy module's SITE CPFR/SITE CPTO commands; mod_copy allows these commands to be used by *unauthenticated clients*.

Solution

Update the affected package.

See Also

http://bugs.proftpd.org/show_bug.cgi?id=4169

http://www.nessus.org/u?a3da31e8

Plugin Details

Severity: Critical

ID: 83752

File Name: freebsd_pkg_d0034536ff2411e4a072d050996490d0.nasl

Version: 2.6

Type: local

Published: 5/21/2015

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Critical

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:proftpd, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 5/20/2015

Vulnerability Publication Date: 4/15/2015

Exploitable With

CANVAS (CANVAS)

Metasploit (ProFTPD 1.3.5 Mod_Copy Command Execution)

Reference Information

CVE: CVE-2015-3306