Initiating NSE at 09:50
Completed NSE at 09:50, 0.00s elapsed
Nmap scan report for localhost (127.0.0.1)
Host is up, received localhost-response (0.000057s latency).
Scanned at 2021-03-03 09:50:05 WIB for 1s
PORT STATE SERVICE REASON VERSION
2021/tcp open ftp syn-ack ttl 64 ProFTPD 1.3.3
| ftp-vuln-cve2010-4221:
| VULNERABLE:
| ProFTPD server TELNET IAC stack overflow
| State: VULNERABLE
| IDs: CVE:CVE-2010-4221 OSVDB:68985 BID:44562
| Risk factor: High CVSSv2: 10.0 (HIGH) (AV:N/AC:L/Au:N/C:C/I:C/A:C)
| ProFTPD server (version 1.3.2rc3 through 1.3.3b) is vulnerable to
| stack-based buffer overflow. By sending a large number of TELNET_IAC
| escape sequence, a remote attacker will be able to corrupt the stack and
| execute arbitrary code.
| Disclosure date: 2011-11-2
| References:
| http://www.metasploit.com/modules/exploit/freebsd/ftp/proftp_telnet_iac
| http://osvdb.org/68985
| http://www.securityfocus.com/bid/44562
| http://bugs.proftpd.org/show_bug.cgi?id=3521
|_ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4221
Service Info: OS: Unix
Final times for host: srtt: 57 rttvar: 5000 to: 100000
Steps to reproduce
How'd you do it?
exploit/linux/ftp/proftp_telnet_iac
RHOSTS localhost
RPORT 2021
check
[*] 127.0.0.1:2021 - The target is not exploitable.
MSF console:
Expected behavior
I'm using NSE script https://github.com/nmap/nmap/blob/master/scripts/ftp-vuln-cve2010-4221.nse to check whether it's vulnerable or not. According to this NSE script, ProFTPD 1.3.3 should be vulnerable.
Nmap NSE script result:
Logs on the target:
Current behavior
The target is not exploitable using the
check
command.[*] 127.0.0.1:2021 - The target is not exploitable.
Metasploit version
$ msfconsole --version Framework Version: 6.0.33-dev-
Additional Information
I'm already creating the fix for the
check
method based on the NSE script. proftp_telnet_iac.zip