Lucene search

K
saintSAINT CorporationSAINT:ECC52DD75C7865AF72D358DC03E39270
HistoryJan 21, 2011 - 12:00 a.m.

ProFTPD Telnet IAC buffer overflow

2011-01-2100:00:00
SAINT Corporation
download.saintcorporation.com
252

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.964 High

EPSS

Percentile

99.6%

Added: 01/21/2011
CVE: CVE-2010-4221
BID: 44562
OSVDB: 68985

Background

ProFTPD is free FTP Server software for Unix and Linux platforms.

Problem

A buffer overflow vulnerability in ProFTPD allows remote attackers to execute arbitrary commands by sending a TELNET_IAC escape sequence to the FTP service.

Resolution

Upgrade to ProFTPD 1.3.3c or higher.

References

<http://www.zerodayinitiative.com/advisories/ZDI-10-229/&gt;

Limitations

Exploit works on ProFTPD 1.3.2c-1 on Ubuntu 10.04 LTS.

Note that because a security cookie exists on the stack and the security cookie stays the same for spawned child processes, this exploit brute-forces the security cookie and may take an excessively long time to find the right one. Therefore, this exploit is unlikely to succeed before it times out. To improve the odds of success, modify the timeout setting in the exploit plug-in, and allow it to run individually for several days.

Platforms

Linux / Ubuntu

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.964 High

EPSS

Percentile

99.6%