vendor:
ProFTPD
by:
milw0rm.com
7,5
CVSS
HIGH
Buffer Overflow
119
CWE
Product Name: ProFTPD
Affected Version From: 1.3.0a
Affected Version To: 1.3.0a
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Linux
2006
Core Security Technologies – Corelabs Advisory ProFTPD Controls buffer overflow
This exploit works with default proftpd 1.3.0a compiled with gcc 4.1.2 (ubuntu edgy). It builds a payload with the format on the stack as AAAA = EBX BBBB = ESI CCCC = EDI DDDD = EBP EEEE = EIP, and sends it to the control socket. This causes a buffer overflow, which can be used to execute arbitrary code.
Mitigation:
Upgrade to the latest version of ProFTPD.