A buffer overflow vulnerability has been found in Proftpd

Summary:

A buffer overflow vulnerability has been found in the popular File Transfer Protocol.

Proftpd has been actively used since 1997 and has been the default

ftp server daemon in several operating systems for several years.

Affected systems

Proftpd versions prior to 1.3.6b

The vulnerability has been given the CVE of CVE-2019-18217.

Vulnerability

src/main.c

if (cmd_buflen < 0) { if (errno == E2BIG) { /* The client sent a too-long command which was ignored; give * them another chance? */ continue; }

A specially crafted package can create an infinite loop caused by

not validating the length of too commands.

This will cause an allocation which could potentially lead to a remote code execution.

Most likely a successful exploitation of this will lead to the program

taking up too much CPU power and being killed by the host operating

system.

You can read the issues that was created in github regarding this in the

following link: https://github.com/proftpd/proftpd/issues/846

Vulnerable hosts

A simple shodan search displays over one million hosts running proftpd.

External links:

Proftpd wikipedia

proftpd.org

Proftpd github

Proftpd CVE-2019-18217 github issue

Proftpd 1997

Stay up to date with Vulnerability Management and build cool things with our API

This blog post is part of the exploit of the day series

where we write a shorter description about interesting

exploits that we index.