[BlueOnyx:10450] Is there a why to upgrade this

Richard Barker rc at probass.com
Sat May 5 18:54:00 -05 2012


Fail of PCI / DSS compliance

Description: possible vulnerability in ProFTP 1.3.3e Severity: Area of 
Concern CVE: CVE-2011-4130 
<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-4130> Impact: 
Attackers exploiting these vulnerabilities may be able to execute 
arbitrary commands, perhapswith root privileges, gain unauthorized 
access, or disrupt service on a target system. Resolution Upgrade 
[http://www.proftpd.org] ProFTPD to version 
[http://www.proftpd.org/docs/RELEASE_NOT ES-1.3.3g 
<http://www.proftpd.org/docs/RELEASE_NOTES-1.3.3g>] 1.3.3g (stable) or 
greater. Please see the ProFTPD Project's general instructions on 
[http://www.proftpd.org/docs/howto/Upgra de.html 
<http://www.proftpd.org/docs/howto/Upgrade.html>] upgrading the 
software. If your copy of the ProFTPD server daemon is part of a larger 
software distribution, check with your software vendor for a newer or 
patched version. All FTP server processes must run as root, at least 
during some parts of their operation, in order to bind to the reserved 
low-numbered network ports that are specified in the 
[http://tools.ietf.org/html/rfc959] FTP standard. The ProFTPD Project 
reminds administrators that, for greater security, the server should be 
configured to [http://www.proftpd.org/docs/howto/Confi 
gFile.html#Identity 
<http://www.proftpd.org/docs/howto/ConfigFile.html#Identity>] run under 
an unprivileged user ID at all times when root privileges are not 
essential. Administrators with even stronger security requirements may 
want to configure the server to [http://www.proftpd.org/docs/howto/Nonro 
ot.html <http://www.proftpd.org/docs/howto/Nonroot.html>] run entirely 
without root privileges, at the cost of some inconvenience. In some 
cases, disallowing anonymous ftp access, or removing write permissions 
from all directories accessible by anonymous ftp could serve as a 
workaround. However, this will only be an effective *Solution* for those 
vulnerabilities which, as noted above, require the attacker to create 
files or directories on the server. You will still need to upgrade 
ProFTPD to fix the other vulnerabilities. Finally, ftp access can be 
restricted by using [ftp://coast.cs.purdue.edu/pub/tools/unix 
/netutils/tcp_wrappers] TCP wrappers. Vulnerability Details: Service: 
ftp Received: 220 ProFTPD 1.3.3e Server (ProFTPD server)


Thanks in advance for any help
RC

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mail.blueonyx.it/pipermail/blueonyx/attachments/20120505/b1f675bf/attachment.html>


More information about the Blueonyx mailing list