English | Deutsch | Español | Português
 UserID:
 Passwd:
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
 Vulnerability   
Search   
    Search 61204 CVE descriptions
and 32582 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.63175
Category:FreeBSD Local Security Checks
Title:FreeBSD Security Advisory (FreeBSD-SA-09:01.lukemftpd.asc)
Summary:FreeBSD Security Advisory (FreeBSD-SA-09:01.lukemftpd.asc)
Description:The remote host is missing an update to the system
as announced in the referenced advisory FreeBSD-SA-09:01.lukemftpd.asc

lukemftpd(8) is a general-purpose implementation of File Transfer Protocol
(FTP) server that is shipped with the FreeBSD base system. It is not enabled
in default installations but can be enabled as either an inetd(8) server,
or a standard-alone server.

A cross-site request forgery attack is a type of malicious exploit that is
mainly targeted to a web browser, by tricking a user trusted by the site
into visiting a specially crafted URL, which in turn executes a command
which performs some privileged operations on behalf of the trusted user
on the victim site.

The lukemftpd(8) server splits long commands into several requests. This
may result in the server executing a command which is hidden inside
another very long command.

Solution:
Upgrade your system to the appropriate stable release
or security branch dated after the correction date

http://www.securityspace.com/smysecure/catid.html?in=FreeBSD-SA-09:01.lukemftpd.asc
Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2008-4247
http://securityreason.com/achievement_securityalert/56
http://bugs.proftpd.org/show_bug.cgi?id=3115
FreeBSD Security Advisory: FreeBSD-SA-08:12
http://security.FreeBSD.org/advisories/FreeBSD-SA-08:12.ftpd.asc
NETBSD Security Advisory: NetBSD-SA2008-014
ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-014.txt.asc
http://www.securitytracker.com/id?1020946
http://www.securitytracker.com/id?1021112
http://secunia.com/advisories/32068
http://secunia.com/advisories/32070
http://secunia.com/advisories/33341
http://securityreason.com/securityalert/4313
CopyrightCopyright (c) 2009 E-Soft Inc. http://www.securityspace.com

This is only one of 32582 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
   Privacy
Registered User Login
 
UserID:   
Passwd:  

 Forgot userid or passwd?
Email/Userid:




Home | About Us | Contact Us | Partner Programs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe | Whois

© 1998-2014 E-Soft Inc. All rights reserved.