Vulnerability Details

bftpd < 5.4 Multiple Vulnerabilities

Published: 2020-01-13 11:58:30
CVE Author: NIST National Vulnerability Database (NVD)

CVSS Base Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C

Detection Type:
Remote Banner

Solution Type:
Vendor Patch

Summary:
bftpd is prone to multiple vulnerabilities.

Detection Method:
Checks if a vulnerable version is present on the target host.

Technical Details:
The following vulnerabilities exist: - Under certain circumstances, an out-of-bounds read is triggered due to an uninitialized value. The daemon crashes at startup in the hidegroups_init function in dirlist.c. - There is a heap-based off-by-one error during file-transfer error-checking.

Impact:
Successful exploitation would allow an attacker to crash the FTP server or execute arbitrary code on the target machine.

Affected Versions:
bftdp through version 5.3.

Recommendations:
Update to version 5.4.

NIST (National Institute of Standards and Technology) NVD (National Vulnerability Database)

https://nvd.nist.gov/vuln/detail/CVE-2020-6162
https://nvd.nist.gov/vuln/detail/CVE-2020-6835

References:

http://bftpd.sourceforge.net/news.html#302460
https://fossies.org/linux/bftpd/CHANGELOG

Search
Severity
High
CVSS Score
9.3

You never have to pay for a vulnerability scanning and management software again.

Tired of paying a subscription 'per asset' or 'per IP'? Well you can officially cancel your current subscription. Mageni provides a free, open source and enterprise-ready vulnerability scanning and management platform which helps you to find, prioritize, remediate and manage your vulnerabilities. It is free and always will be.