[Bug 1462311] Re: proftpd mod_copy issue (CVE-2015-3306)
Launchpad Bug Tracker
1462311 at bugs.launchpad.net
Thu Dec 8 03:18:00 UTC 2016
This bug was fixed in the package proftpd-dfsg - 1.3.5~rc3-2.1ubuntu2.1
---------------
proftpd-dfsg (1.3.5~rc3-2.1ubuntu2.1) trusty-security; urgency=low
* SECURITY UPDATE: The mod_copy module in ProFTPD 1.3.5 allows remote
attackers to read and write to arbitrary files via the site cpfr and
site cpto commands. (LP: #1462311)
- debian/patches/CVE-2015-3306.patch: adjust contrib/mod_copy.c to
check authentication status. Based on upstream patch.
- CVE-2015-3306
-- Brian Morton <bmorton at dvidshub.net> Sat, 4 Dec 2016 15:34:12 -0500
--
You received this bug notification because you are a member of ProFTPD
Maintainance Team, which is subscribed to proftpd-dfsg in Ubuntu.
https://bugs.launchpad.net/bugs/1462311
Title:
proftpd mod_copy issue (CVE-2015-3306)
Status in Proftpd Dfsg:
Fix Released
Status in proftpd-dfsg package in Ubuntu:
Fix Released
Status in proftpd-dfsg source package in Precise:
Fix Released
Status in proftpd-dfsg source package in Trusty:
Fix Released
Bug description:
The CVE-2015-3306 problem is arround for some time now and is not fixed in 12.04 and 14.04 LTS versions.
http://people.canonical.com/~ubuntu-security/cve/2015/CVE-2015-3306.html
I also tested it with telnet.
I can copy files without any authentication if mod_copy is enabled (mod_copy is per default enabled!)
The module is very usefull. I would be happy if I can re enable it on my servers.
Debian and other distributions have already fix this in their systems.
http://bugs.proftpd.org/show_bug.cgi?id=4169
https://security-tracker.debian.org/tracker/CVE-2015-3306
https://www.debian.org/security/2015/dsa-3263
Is there a special reason why this still not fixed on the LTS versions
of Ubuntu?
To manage notifications about this bug go to:
https://bugs.launchpad.net/proftpd-dfsg/+bug/1462311/+subscriptions
More information about the Pkg-proftpd-maintainers
mailing list