File: 2338.txt

package info (click to toggle)
snort 2.9.7.0-5
  • links: PTS, VCS
  • area: main
  • in suites: bullseye, buster, sid, stretch
  • size: 55,000 kB
  • ctags: 38,464
  • sloc: ansic: 266,667; sh: 12,508; makefile: 2,908; yacc: 497; perl: 496; lex: 261; sed: 14
file content (61 lines) | stat: -rw-r--r-- 1,076 bytes parent folder | download | duplicates (6)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
Rule:  

--
Sid:
2338

--
Summary:
This event is generated when an attempt is made to exploit a known
vulnerability in GtkFtpd.

--
Impact:
Execution of arbitrary code. Possible unauthorized root access.

--
Detailed Information:
GtkFtpd fails to perform sufficient checks on user supplied data to the
daemon. An attacker may exploit this vulnerability to execute code of
their choosing as the root user. This may also lead to remote root
access to the server.

--
Affected Systems:
	GtkFtpd 1.0.2, 1.0.3 and 1.0.4

--
Attack Scenarios:
An attacker may use a publicly available exploit script to take
advantage of the vulnerability.

--
Ease of Attack:
Simple. Exploit code exists.

--
False Positives:
None known.

--
False Negatives:
None known.

--
Corrective Action:
Apply the appropriate vendor supplied patches.

Upgrade to the latest non-affected version of the software.

Use scp/sftp as an alternative to ftp.

--
Contributors:
Sourcefire Research Team
Brian Caswell <bmc@sourcefire.com>
Nigel Houghton <nigel.houghton@sourcefire.com>

-- 
Additional References:

--