Risk | High |
Patch available | YES |
Number of vulnerabilities | 3 |
CVE-ID | CVE-2023-48795 CVE-2023-51713 CVE-2024-48651 |
CWE-ID | CWE-326 CWE-125 CWE-269 |
Exploitation vector | Network |
Public exploit | Public exploit code for vulnerability #1 is available. |
Vulnerable software |
Ubuntu Operating systems & Components / Operating system proftpd-basic (Ubuntu package) Operating systems & Components / Operating system package or component proftpd-core (Ubuntu package) Operating systems & Components / Operating system package or component |
Vendor | Canonical Ltd. |
Security Bulletin
This security bulletin contains information about 3 vulnerabilities.
EUVDB-ID: #VU84537
Risk: Low
CVSSv4.0: 2.9 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/U:Clear]
CVE-ID: CVE-2023-48795
CWE-ID:
CWE-326 - Inadequate Encryption Strength
Exploit availability: Yes
DescriptionThe vulnerability allows a remote attacker to perform MitM attack.
The vulnerability exists due to incorrect implementation of the SSH Binary Packet Protocol (BPP), which mishandles the handshake phase and the use of sequence numbers. A remote attacker can perform MitM attack and delete the SSH2_MSG_EXT_INFO message sent before authentication starts, allowing the attacker to disable a subset of the keystroke timing obfuscation features introduced in OpenSSH 9.5.
The vulnerability was dubbed "Terrapin attack" and it affects both client and server implementations.
Update the affected package proftpd-dfsg to the latest version.
Vulnerable software versionsUbuntu: 20.04 - 24.10
proftpd-basic (Ubuntu package): before 1.3.6c-2ubuntu0.1
proftpd-core (Ubuntu package): before 1.3.7c+dfsg-1ubuntu0.1
CPE2.3http://ubuntu.com/security/notices/USN-7297-1
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU84847
Risk: Medium
CVSSv4.0: 4.9 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-51713
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a remote user to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary condition within the make_ftp_cmd() function in main.c. A remote user can pass a specially crafted command to the server, trigger an out-of-bounds read error and perform a denial of service (DoS) attack.
Update the affected package proftpd-dfsg to the latest version.
Vulnerable software versionsUbuntu: 20.04 - 24.10
proftpd-basic (Ubuntu package): before 1.3.6c-2ubuntu0.1
proftpd-core (Ubuntu package): before 1.3.7c+dfsg-1ubuntu0.1
CPE2.3http://ubuntu.com/security/notices/USN-7297-1
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU101665
Risk: High
CVSSv4.0: 7.5 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N/E:U/U:Amber]
CVE-ID: CVE-2024-48651
CWE-ID:
CWE-269 - Improper Privilege Management
Exploit availability: No
DescriptionThe vulnerability allows a remote user to compromise the affected system.
The vulnerability exists due to improper privilege management when handling users without assigned supplementary groups. If the user has no groups assigned to their account, the server will assume the GID of 0 for this account. As a result, the user will gain access to files and directories owned by the system root user and will be able to modify them at will, leading to privilege escalation and system compromise.
Update the affected package proftpd-dfsg to the latest version.
Vulnerable software versionsUbuntu: 20.04 - 24.10
proftpd-basic (Ubuntu package): before 1.3.6c-2ubuntu0.1
proftpd-core (Ubuntu package): before 1.3.7c+dfsg-1ubuntu0.1
CPE2.3http://ubuntu.com/security/notices/USN-7297-1
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.