CVE-2004-0432
CVSS7.5
发布时间 :2004-08-18 00:00:00
修订时间 :2016-10-17 22:45:22
NMCOS    

[原文]ProFTPD 1.2.9 treats the Allow and Deny directives for CIDR based ACL entries as if they were AllowAll, which could allow FTP clients to bypass intended access restrictions.


[CNNVD]ProFTPD CIDR访问控制规则绕过漏洞(CNNVD-200408-148)

        
        ProFTPD是一款高可配置性的FTP服务程序。
        ProFTPD的访问控制规则存在问题,远程攻击者可以利用这个漏洞绕过管理员设置的安全规则。
        ProFTPD存在安全漏洞可导致在"Allow"和"Deny"选项的基于CIDR ACL条目执行类似"AllowAll"的规则,使管理员设置的访问失败。
        

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

cpe:/a:proftpd_project:proftpd:1.2.9
cpe:/o:gentoo:linux:1.1a
cpe:/o:gentoo:linux:1.4:rc2Gentoo Linux 1.4 rc2
cpe:/o:gentoo:linux:0.7
cpe:/o:gentoo:linux:1.2Gentoo Linux 1.2
cpe:/o:gentoo:linux:1.4:rc1Gentoo Linux 1.4 rc1
cpe:/o:gentoo:linux:0.5
cpe:/o:gentoo:linux:1.4Gentoo Linux 1.4
cpe:/o:trustix:secure_linux:2.1Trustix Secure Linux 2.1
cpe:/o:gentoo:linux:1.4:rc3Gentoo Linux 1.4 rc3
cpe:/o:trustix:secure_linux:2.0Trustix Secure Linux 2.0

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0432
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2004-0432
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200408-148
(官方数据源) CNNVD

- 其它链接及资源

http://bugs.proftpd.org/show_bug.cgi?id=2267
(UNKNOWN)  CONFIRM  http://bugs.proftpd.org/show_bug.cgi?id=2267
http://marc.info/?l=bugtraq&m=108335030208523&w=2
(UNKNOWN)  TRUSTIX  2004-0025
http://marc.info/?l=bugtraq&m=108335051011341&w=2
(UNKNOWN)  BUGTRAQ  20040430 [OpenPKG-SA-2004.018] OpenPKG Security Advisory (proftpd)
http://www.mandriva.com/security/advisories?name=MDKSA-2004:041
(UNKNOWN)  MANDRAKE  MDKSA-2004:041
http://www.securityfocus.com/bid/10252
(VENDOR_ADVISORY)  BID  10252
http://xforce.iss.net/xforce/xfdb/16038
(VENDOR_ADVISORY)  XF  proftpd-cidr-acl-bypass(16038)

- 漏洞信息

ProFTPD CIDR访问控制规则绕过漏洞
高危 访问验证错误
2004-08-18 00:00:00 2005-10-20 00:00:00
远程  
        
        ProFTPD是一款高可配置性的FTP服务程序。
        ProFTPD的访问控制规则存在问题,远程攻击者可以利用这个漏洞绕过管理员设置的安全规则。
        ProFTPD存在安全漏洞可导致在"Allow"和"Deny"选项的基于CIDR ACL条目执行类似"AllowAll"的规则,使管理员设置的访问失败。
        

- 公告与补丁

        厂商补丁:
        MandrakeSoft
        ------------
        MandrakeSoft已经为此发布了一个安全公告(MDKSA-2004:041)以及相应补丁:
        MDKSA-2004:041:Updated ProFTPD packages fix vulnerability
        链接:
        http://www.linux-mandrake.com/en/security/2004/2004-041.php

        补丁下载:
        Updated Packages:
        Mandrakelinux 10.0:
        ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/10.0/RPMS/proftpd-1.2.9-3.1.100mdk.i586.rpm
        ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/10.0/RPMS/proftpd-anonymous-1.2.9-3.1.100mdk.i586.rpm
        ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/10.0/SRPMS/proftpd-1.2.9-3.1.100mdk.src.rpm
        _______________________________________________________________________
        To upgrade automatically use MandrakeUpdate or urpmi. The verification
        上述升级软件还可以在下列地址中的任意一个镜像ftp服务器上下载:
        
        http://www.mandrakesecure.net/en/ftp.php

- 漏洞信息

5744
ProFTPD CIDR IP Subnet ACL Bypass
Remote / Network Access Misconfiguration
Loss of Integrity

- 漏洞描述

ProFTPD contains a flaw that may allow a malicious user to bypass access control lists. The issue is triggered when an ACL is created using CIDR format, which is treated as AllowAll. It is possible that the flaw may allow unauthorized access resulting in a loss of integrity.

- 时间线

2004-04-30 2003-11-04
Unknow Unknow

- 解决方案

Upgrade to version 1.2.10rc1 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

- 漏洞信息

ProFTPD CIDR Access Control Rule Bypass Vulnerability
Access Validation Error 10252
Yes No
2004-04-30 12:00:00 2009-07-12 04:07:00
The individual that discovered this vulnerability is currently unknown.

- 受影响的程序版本

Turbolinux Turbolinux Server 10.0
Turbolinux Appliance Server 2.0
Trustix Secure Linux 2.1
Trustix Secure Linux 2.0
Trustix Secure Enterprise Linux 2.0
ProFTPD Project ProFTPD 1.2.9
+ Mandriva Linux Mandrake 10.0
+ OpenPKG OpenPKG 2.0
+ OpenPKG OpenPKG 1.3
+ OpenPKG OpenPKG Current
+ Slackware Linux 9.1
+ Slackware Linux 9.0
+ Slackware Linux 8.1
+ Slackware Linux -current
Gentoo Linux 1.4 _rc3
Gentoo Linux 1.4 _rc2
Gentoo Linux 1.4 _rc1
Gentoo Linux 1.4
Gentoo Linux 1.2
Gentoo Linux 1.1 a
Gentoo Linux 0.7
Gentoo Linux 0.5

- 漏洞讨论

ProFTPD is prone to a vulnerability that an attacker could exploit to bypass an Access Control List (ACL). The issue was reportedly introduced when a 'portability workaround' was applied to ProFTPD 1.2.9.

This vulnerability may lead a system administrator into a false sense of security, where access to the ProFTPD server is believed to be restricted by ACLs, but in reality the access restrictions will not be enforced at all.

- 漏洞利用

An exploit is not required.

- 解决方案

Updates are available. Please see the references for details.


ProFTPD Project ProFTPD 1.2.9

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站