ProFTPD 1.3.0/1.3.0a mod_ctrls pr_ctrls_recv_request stack-based overflow
| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 5.0 | $0-$5k | 0.00 |
Summary
A vulnerability has been found in ProFTPD 1.3.0/1.3.0a and classified as critical. This affects the function pr_ctrls_recv_request of the component mod_ctrls. The manipulation leads to stack-based overflow.
This vulnerability is uniquely identified as CVE-2006-6563. The attack can only be initiated within the local network. Moreover, an exploit is present.
The affected component should be upgraded.
Details
A vulnerability, which was classified as critical, has been found in ProFTPD 1.3.0/1.3.0a (File Transfer Software). This issue affects the function pr_ctrls_recv_request of the component mod_ctrls. The manipulation with an unknown input leads to a stack-based overflow vulnerability. Using CWE to declare the problem leads to CWE-121. A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function). Impacted is confidentiality, integrity, and availability. The summary by CVE is:
Stack-based buffer overflow in the pr_ctrls_recv_request function in ctrls.c in the mod_ctrls module in ProFTPD before 1.3.1rc1 allows local users to execute arbitrary code via a large reqarglen length value.
The weakness was disclosed 12/14/2006 by Alfredo Ortega with Core Security Technologies (Website). It is possible to read the advisory at coresecurity.com. The identification of this vulnerability is CVE-2006-6563 since 12/14/2006. The attack needs to be done within the local network. Technical details as well as a public exploit are known.
After before and not just, there has been an exploit disclosed. The exploit is available at exploit-db.com. It is declared as proof-of-concept. The vulnerability was handled as a non-public zero-day exploit for at least 1 days. During that time the estimated underground price was around $5k-$25k. The vulnerability scanner Nessus provides a plugin with the ID 17718 (ProFTPD < 1.3.1rc1 mod_ctrls Module pr_ctrls_recv_request Function Local Overflow), which helps to determine the existence of the flaw in a target environment. It is assigned to the family FTP and running in the context r. The commercial vulnerability scanner Qualys is able to test this issue with plugin 27287 (ProFTPD Controls Module Local Buffer Overflow Vulnerability).
Upgrading eliminates this vulnerability. Applying a patch is able to eliminate this problem. The bugfix is ready for download at proftpd.org. The best possible mitigation is suggested to be upgrading to the latest version. A possible mitigation has been published 3 months after the disclosure of the vulnerability.
The vulnerability is also documented in the databases at X-Force (30906), Exploit-DB (3330), Tenable (17718), SecurityFocus (BID 21587†) and OSVDB (31509†). Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.
Product
Type
Name
Version
License
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 5.5VulDB Meta Temp Score: 5.0
VulDB Base Score: 5.5
VulDB Temp Score: 5.0
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Stack-based overflowCWE: CWE-121 / CWE-119
CAPEC: 🔍
ATT&CK: 🔍
Physical: Partially
Local: Yes
Remote: Partially
Availability: 🔍
Access: Public
Status: Proof-of-Concept
Download: 🔍
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Nessus ID: 17718
Nessus Name: ProFTPD < 1.3.1rc1 mod_ctrls Module pr_ctrls_recv_request Function Local Overflow
Nessus File: 🔍
Nessus Risk: 🔍
Nessus Family: 🔍
Nessus Context: 🔍
OpenVAS ID: 58019
OpenVAS Name: Gentoo Security Advisory GLSA 200702-02 (proftpd)
OpenVAS File: 🔍
OpenVAS Family: 🔍
Qualys ID: 🔍
Qualys Name: 🔍
Exploit-DB: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
Reaction Time: 🔍
0-Day Time: 🔍
Exposure Time: 🔍
Patch: proftpd.org
Timeline
12/13/2006 🔍12/13/2006 🔍
12/14/2006 🔍
12/14/2006 🔍
12/14/2006 🔍
12/15/2006 🔍
12/15/2006 🔍
12/18/2006 🔍
02/13/2007 🔍
02/19/2007 🔍
11/18/2011 🔍
08/24/2024 🔍
Sources
Advisory: coresecurity.comResearcher: Alfredo Ortega
Organization: Core Security Technologies
Status: Confirmed
Confirmation: 🔍
CVE: CVE-2006-6563 (🔍)
GCVE (CVE): GCVE-0-2006-6563
GCVE (VulDB): GCVE-100-2747
X-Force: 30906 - ProFTPD Controls (mod_ctrls) module buffer overflow, High Risk
SecurityFocus: 21587 - ProFTPD Controls Module Local Buffer Overflow Vulnerability
Secunia: 24163 - Gentoo update for proftpd, Less Critical
OSVDB: 31509 - ProFTPD mod_ctrls Module pr_ctrls_recv_request Function Local Overflow
Vulnerability Center: 14332 - ProFTPD before 1.3.1rc1 Local Code Execution, Medium
Vupen: ADV-2006-4998
scip Labs: https://www.scip.ch/en/?labs.20161013
Entry
Created: 12/18/2006 10:06Updated: 08/24/2024 00:18
Changes: 12/18/2006 10:06 (93), 06/07/2017 14:55 (9), 03/13/2021 17:19 (3), 08/24/2024 00:18 (15)
Complete: 🔍
Cache ID: 216:421:103
Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.
No comments yet. Languages: en.
Please log in to comment.