Script ftp-vuln-cve2010-4221
Script types:
portrule
Categories:
intrusive, vuln
Download: https://svn.nmap.org/nmap/scripts/ftp-vuln-cve2010-4221.nse
Script Summary
Checks for a stack-based buffer overflow in the ProFTPD server, version between 1.3.2rc3 and 1.3.3b. By sending a large number of TELNET_IAC escape sequence, the proftpd process miscalculates the buffer length, and a remote attacker will be able to corrupt the stack and execute arbitrary code within the context of the proftpd process (CVE-2010-4221). Authentication is not required to exploit this vulnerability.
Reference:
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4221
- http://www.exploit-db.com/exploits/15449/
- http://www.metasploit.com/modules/exploit/freebsd/ftp/proftp_telnet_iac
Script Arguments
- vulns.short, vulns.showall
See the documentation for the vulns library.
Example Usage
nmap --script ftp-vuln-cve2010-4221 -p 21 <host>
Script Output
PORT STATE SERVICE 21/tcp open ftp | ftp-vuln-cve2010-4221: | VULNERABLE: | ProFTPD server TELNET IAC stack overflow | State: VULNERABLE | IDs: CVE:CVE-2010-4221 BID:44562 | Risk factor: High CVSSv2: 10.0 (HIGH) (AV:N/AC:L/Au:N/C:C/I:C/A:C) | Description: | ProFTPD server (version 1.3.2rc3 through 1.3.3b) is vulnerable to | stack-based buffer overflow. By sending a large number of TELNET_IAC | escape sequence, a remote attacker will be able to corrupt the stack and | execute arbitrary code. | Disclosure date: 2010-11-02 | References: | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4221 | http://www.metasploit.com/modules/exploit/freebsd/ftp/proftp_telnet_iac | http://bugs.proftpd.org/show_bug.cgi?id=3521 |_ https://www.securityfocus.com/bid/44562
Requires
Author:
License: Same as Nmap--See https://nmap.org/book/man-legal.html