Vulnerabilities > CVE-2019-18217 - Infinite Loop vulnerability in Proftpd

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
NONE
Availability impact
HIGH
network
low complexity
proftpd
CWE-835
nessus

Summary

ProFTPD before 1.3.6b and 1.3.7rc before 1.3.7rc2 allows remote unauthenticated denial-of-service due to incorrect handling of overly long commands because main.c in a child process enters an infinite loop.

Nessus

  • NASL familySuSE Local Security Checks
    NASL idOPENSUSE-2020-31.NASL
    descriptionThis update for proftpd fixes the following issues : - GeoIP has been discontinued by Maxmind (boo#1156210) This update removes module build for geoip see https://support.maxmind.com/geolite-legacy-discontinuati on-notice/ - CVE-2019-19269: Fixed a NULL pointer dereference may occur when validating the certificate of a client connecting to the server (boo#1157803) - CVE-2019-19270: Fixed a Failure to check for the appropriate field of a CRL entry prevents some valid CRLs from being taken into account (boo#1157798) - CVE-2019-18217: Fixed remote unauthenticated denial-of-service due to incorrect handling of overly long commands (boo#1154600 gh#846) Update to 1.3.6b - Fixed pre-authentication remote denial-of-service issue (Issue #846). - Backported fix for building mod_sql_mysql using MySQL 8 (Issue #824). Update to 1.3.6a : - Fixed symlink navigation (Bug#4332). - Fixed building of mod_sftp using OpenSSL 1.1.x releases (Issue#674). - Fixed SITE COPY honoring of <Limit> restrictions (Bug#4372). - Fixed segfault on login when using mod_sftp + mod_sftp_pam (Issue#656). - Fixed restarts when using mod_facl as a static module - Add missing Requires(pre): group(ftp) for Leap 15 and Tumbleweed (boo#1155834) - Add missing Requires(pre): user(ftp) for Leap 15 and Tumbleweed (boo#1155834) - Use pam_keyinit.so (boo#1144056) - Reduce hard dependency on systemd to only that which is necessary for building and installation. update to 1.3.6 : - Support for using Redis for caching, logging; see the doc/howto/Redis.html documentation. - Fixed mod_sql_postgres SSL support (Issue #415). - Support building against LibreSSL instead of OpenSSL (Issue #361). - Better support on AIX for login restraictions (Bug #4285). - TimeoutLogin (and other timeouts) were not working properly for SFTP connections (Bug#4299). - Handling of the SIGILL and SIGINT signals, by the daemon process, now causes the child processes to be terminated as well (Issue #461). - RPM .spec file naming changed to conform to Fedora guidelines. - Fix for
    last seen2020-06-01
    modified2020-06-02
    plugin id132911
    published2020-01-15
    reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/132911
    titleopenSUSE Security Update : proftpd (openSUSE-2020-31)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2019-AE019C7E9F.NASL
    descriptionThis is a cumulative bug-fix update from upstream, including a fix for a pre-authentication remote denial of service issue. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id130314
    published2019-10-28
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/130314
    titleFedora 29 : proftpd (2019-ae019c7e9f)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2019-848E410CFB.NASL
    descriptionThis is a cumulative bug-fix update from upstream, including a fix for a pre-authentication remote denial of service issue. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id130307
    published2019-10-28
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/130307
    titleFedora 31 : proftpd (2019-848e410cfb)
  • NASL familyGentoo Local Security Checks
    NASL idGENTOO_GLSA-202003-35.NASL
    descriptionThe remote host is affected by the vulnerability described in GLSA-202003-35 (ProFTPd: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in ProFTPd. Please review the CVE identifiers referenced below for details. Impact : A remote attacker, by interrupting the data transfer channel, could possibly execute arbitrary code with the privileges of the process or cause a Denial of Service condition. Workaround : There is no known workaround at this time.
    last seen2020-03-21
    modified2020-03-18
    plugin id134641
    published2020-03-18
    reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/134641
    titleGLSA-202003-35 : ProFTPd: Multiple vulnerabilities
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-4559.NASL
    descriptionStephan Zeisberg discovered that missing input validation in ProFTPD, a FTP/SFTP/FTPS server, could result in denial of service via an infinite loop.
    last seen2020-06-01
    modified2020-06-02
    plugin id130525
    published2019-11-06
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/130525
    titleDebian DSA-4559-1 : proftpd-dfsg - security update
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2019-7559F29ACE.NASL
    descriptionThis is a cumulative bug-fix update from upstream, including a fix for a pre-authentication remote denial of service issue. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id130352
    published2019-10-29
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/130352
    titleFedora 30 : proftpd (2019-7559f29ace)
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DLA-1974.NASL
    descriptionAn issue has been found in proftp-dfsg, a versatile, virtual-hosting FTP daemon. Due to incorrect handling of overly long commands, a remote unauthenticated user could trigger a denial of service by reaching an endless loop. For Debian 8
    last seen2020-06-01
    modified2020-06-02
    plugin id130287
    published2019-10-28
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/130287
    titleDebian DLA-1974-1 : proftpd-dfsg security update

References