Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> FTP >> proftpd 1.2.0rc2 format string vuln


Vulnerability Assessment Details

proftpd 1.2.0rc2 format string vuln

Vulnerability Assessment Summary
Checks if the version of the remote proftpd

Detailed Explanation for this Vulnerability Assessment

The remote ProFTPd server is as old or older than 1.2.0rc2

There is a very hard to exploit format string vulnerability in
this version, which may permit a possible hacker to execute arbitrary
code on this host.

The vulnerability is believed to be nearly impossible to exploit
though

Solution : Upgrade to a newer version
Network Security Threat Level: Medium

Networks Security ID: 6781

Vulnerability Assessment Copyright: This script is Copyright (C) 2003 Renaud Deraison

Cables, Connectors

Cisco WS-C3560X-24T-E Layer3 Switch Tested
$1150.0
Cisco WS-C3560X-24T-E Layer3 Switch Tested pictureFor Cisco QSFP-40G-SR4,40Gb QSFP SR4 Transceiver,40GBase-SR4 Cisco QSFP+ Module
$89.99
For Cisco QSFP-40G-SR4,40Gb QSFP SR4 Transceiver,40GBase-SR4 Cisco QSFP+ Module pictureCisco WS-X4013 Supervisor II Engine Switch, 800-05827-01 A0
$569.25
Cisco WS-X4013 Supervisor II Engine Switch, 800-05827-01 A0 pictureCISCO SFP-10G-SR= 10GBase-SR SFP+ Transceiver Module NEW SEALED
$65.0
CISCO SFP-10G-SR= 10GBase-SR SFP+ Transceiver Module   NEW SEALED picture


Discussions

No Discussions have been posted on this vulnerability.