Secunia Security Advisory - Stefan Lochbihler has discovered a vulnerability in freeftpd, which can be exploited by malicious users to cause a DoS (Denial of Service).
f9ab4f30707cf0b487ae2c76363708e65986d70ede011ba816dc7a52d5109bed
TITLE:
Freeftpd PORT Command Denial of Service Vulnerability
SECUNIA ADVISORY ID:
SA17737
VERIFY ADVISORY:
http://secunia.com/advisories/17737/
CRITICAL:
Less critical
IMPACT:
DoS
WHERE:
>From remote
SOFTWARE:
Freeftpd 1.x
http://secunia.com/product/6138/
DESCRIPTION:
Stefan Lochbihler has discovered a vulnerability in freeftpd, which
can be exploited by malicious users to cause a DoS (Denial of
Service).
The vulnerability is caused due to a NULL pointer dereferencing error
that exists when parsing the parameter of the PORT command. This is
due to the failure to check for a NULL return value from the
"strstr()" function when looking for the "," separator. This can be
exploited to crash the service.
The vulnerability has been confirmed in version 1.0.10. Other
versions may also be affected.
SOLUTION:
Grant only trusted users access to the FTP service.
PROVIDED AND/OR DISCOVERED BY:
Stefan Lochbihler
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------