Critical Remote Root Exploit: FTP Server Security Issue: Plesk 9.5.x 10.x

rackaid

New member
A critical security issues has been discovered in ProFTPd. This is the FTP server supplied with Plesk.

Today Plesk has announce a patch for the issue:
http://kb.parallels.com/en/9294

History on this issue can be found here:
http://bugs.proftpd.org/show_bug.cgi?id=3521

There was considerable confusion about this issue and what versions of Plesk are impacted. As we understand it, Plesk <= 9.3 is not impacted.

According to the ProFTPd bug reports:
Inspecting the sources of versions past indicates that this vulnerability has been present since proftpd-1.3.2rc3.

If you FTP into your server, the ProFTP version will be displayed:

Code:
Connected to localhost.localdomain.
220 ProFTPD 1.3.1 Server (ProFTPD) [127.0.0.1]
500 AUTH not understood
500 AUTH not understood

If your version is 1.3.2rc3 or later, then review the Plesk information about fixing the issue.

There was another Plesk announcement yesterday, but some of the information at that time was incorrect:
http://www.parallels.com/products/plesk/ProFTPD

If you are unsure about your FTP, use Plesk's firewall module to block FTP and/or disable FTP at the command line:

Code:
chkconfig ftp_psa off
service xinetd restart
 
Back
Top