Vulnerabilities > CVE-2001-0456 - Unspecified vulnerability in Debian Linux 2.2
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN debian
nessus
Summary
postinst installation script for Proftpd in Debian 2.2 does not properly change the "run as uid/gid root" configuration when the user enables anonymous access, which causes the server to run at a higher privilege than intended.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
OS | 1 |
Nessus
NASL family FTP NASL id PROFTPD_DEBIAN.NASL description The following problems have been reported for the version of proftpd in Debian 2.2 (potato): 1. There is a configuration error in the postinst script, when the user enters last seen 2020-06-01 modified 2020-06-02 plugin id 11450 published 2003-03-23 reporter This script is Copyright (C) 2003-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/11450 title ProFTPD on Debian Linux postinst Installation Privilege Escalation code # # (C) Tenable Network Security, Inc. # include("compat.inc"); if (description) { script_id(11450); script_version("1.12"); script_cvs_date("Date: 2018/08/13 14:32:36"); script_cve_id("CVE-2001-0456"); script_xref(name:"DSA", value:"032"); script_name(english:"ProFTPD on Debian Linux postinst Installation Privilege Escalation"); script_summary(english:"Checks if the version of the remote proftpd"); script_set_attribute(attribute:"synopsis", value: "The remote FTP server is affected by several flaws."); script_set_attribute(attribute:"description", value: "The following problems have been reported for the version of proftpd in Debian 2.2 (potato): 1. There is a configuration error in the postinst script, when the user enters 'yes', when asked if anonymous access should be enabled. The postinst script wrongly leaves the 'run as uid/gid root' configuration option in /etc/proftpd.conf, and adds a 'run as uid/gid nobody' option that has no effect. 2. There is a bug that comes up when /var is a symlink, and proftpd is restarted. When stopping proftpd, the /var symlink is removed; when it's started again a file named /var is created."); script_set_attribute(attribute:"solution", value: "Upgrade your proftpd server to proftpd-1.2.0pre10-2.0potato1"); script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:P"); script_set_attribute(attribute:"plugin_publication_date", value:"2003/03/23"); script_set_attribute(attribute:"vuln_publication_date", value:"2001/03/07"); script_set_attribute(attribute:"plugin_type", value:"remote"); script_set_attribute(attribute:"cpe", value:"cpe:/a:proftpd:proftpd"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_family(english:"FTP"); script_copyright(english:"This script is Copyright (C) 2003-2018 Tenable Network Security, Inc."); script_dependencie("ftpserver_detect_type_nd_version.nasl"); script_require_keys("ftp/proftpd"); script_require_ports("Services/ftp", 21); exit(0); } # # The script code starts here : # include("ftp_func.inc"); port = get_ftp_port(default: 21); banner = get_ftp_banner(port:port); if (! banner) exit(1); if(egrep(pattern:"^220 ProFTPD 1\.(0\..*|2\.0pre([0-9][^0-9]|10)).*debian.*", string:banner, icase:TRUE))security_warning(port);
NASL family Debian Local Security Checks NASL id DEBIAN_DSA-032.NASL description The following problems have been reported for the version of proftpd in Debian 2.2 (potato) : - There is a configuration error in the postinst script, when the user enters last seen 2020-06-01 modified 2020-06-02 plugin id 14869 published 2004-09-29 reporter This script is Copyright (C) 2004-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/14869 title Debian DSA-032-1 : proftpd - proftpd running with incorrect userid, erroneous file removal