FTP: ProFTPD Size DoS (Detected by Pathname)
This signature detects attempts to exploit a known vulnerability in ProFTPD. Version 1.2.0pre* is vulnerable. Attackers can send multiple SIZE requests with a static pathname to create a denial-of-service (DoS) condition.
Extended Description
A memory leak has been reported in all versions of ProFTPd. The SIZE FTP command causes the server to misallocate and leak small amounts of memory each time the command is executed. If a sufficient number of these commands are executed by the server, substantial amounts of system memory can be consumed, allowing a remote attacker to carry out a denial of service attack on the affected host. This could be problematic if anonymous FTP is enabled or if a malicious local user has been supplied with an FTP login ID.
Affected Products
Proftpd_project proftpd
References
BugTraq: 2185
CVE: CVE-2001-0136
URL: http://www.securityfocus.com/advisories/3102 http://www.securityfocus.com/advisories/3106
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3
Proftpd_project
5.0