• Please be aware: Kaspersky Anti-Virus has been deprecated
    With the upgrade to Plesk Obsidian 18.0.64, "Kaspersky Anti-Virus for Servers" will be automatically removed from the servers it is installed on. We recommend that you migrate to Sophos Anti-Virus for Servers.
  • The Horde webmail has been deprecated. Its complete removal is scheduled for April 2025. For details and recommended actions, see the Feature and Deprecation Plan.
  • We’re working on enhancing the Monitoring feature in Plesk, and we could really use your expertise! If you’re open to sharing your experiences with server and website monitoring or providing feedback, we’d love to have a one-hour online meeting with you.

Critical security issue in Plesk 10 Proftpd

JuergenW

New Pleskian
Hi Parallels-Team!

Plesk 10 comes with ProFTPD v 1.3.3 (psa-proftpd-1.3.3-cos5.build109101020.08.x86_64 : ProFTPD -- Professional FTP Server). Unfortunately this version has a critical security issue. See http://www.h-online.com/security/news/item/Security-update-for-ProFTPD-FTP-server-1128907.html and http://bugs.proftpd.org/show_bug.cgi?id=3521:

------------------ begin snippet ---------------------

Security update for ProFTPD FTP server
A flaw in the popular ProFTPD FTP server potentially allows unauthenticated attackers to compromise a server. The problem is caused by a buffer overflow in the pr_netio_telnet_gets() function for evaluating TELNET IAC sequences.

ProFTPD is capable of processing TELNET IAC sequences on port 21; the sequences enable or disable certain options not supported by the Telnet or FTP protocol itself. The buffer overflow allows attackers to write arbitrary code to the application's stack and launch it. Updating to version 1.3.3c of ProFTPD solves the problem.

The update also fixes a directory traversal vulnerability which can only be exploited if the "mod_site_misc" module is loaded. This flaw could allow attackers with write privileges to leave their permitted path and delete directories or create symbolic links outside of the path. The module is not loaded or compiled by default.

Further information about the update can be found in the release notes and in the NEWS file. As the developers have classified the release as an "important security update", all users are advised to install it as soon as possible.

------------------- endsnippet ----------------------

To fix the issue ProFTPD 1.3.3c was released.

When will Parallels provide the neccessary update for Plesk 10? Or do we have to patch ProFTPD bei ourself? For which Plesk version you´ll provide a fix?!?

Thanks!
 
Hello Juergen,

Is your proftp working in your Plesk?
Mine is 10.0.1, and ftp is totaly out of service.

Thanks,
Jorge.
 
Yes, we are using FTP and ProFTPD.
The atomic RPMs seem to be nice. But we´d prefer an original update from Parallels. Parallels, can you please post a short statement?

Thanks!
 
Is Parallels going to release a fixed ProFTP package for Plesk 8.6, 9.x and 10.x anytime soon?

Thanks.
 
Does anyone know if this vulnerability also affects the ProFTPD version shipped with Plesk 8.6 and 9.x?

Thanks.
 
Does anyone know if this vulnerability also affects the ProFTPD version shipped with Plesk 8.6 and 9.x?

Inspecting the sources of versions past
indicates that this vulnerability has been present since proftpd-1.3.2rc3.
http://bugs.proftpd.org/show_bug.cgi?id=3521

I think proftpd-1.3.2 has been shipped with Plesk 9.5 for the first time. At least Plesk 9.3.0 was shipped with proftpd-1.3.1 and should not be affected by this issue.
 
Quick question, how do I disable FTP services on Debian, Pleksk 9.5.2?

ta.
 
Quick question, how do I disable FTP services on Debian, Pleksk 9.5.2?

ta.

don't know exactly, on centos it's started via xined so look out for /etc/xinetd.conf or /etc/xinetd.d/psa_ftp and after the change restart xinetd if "ftp localhost" still works.

anyway, better questions would be:
1. how do i find out if my server got hacked in the 6 days between public availibility of the crack and switching off ftp/fixing it
2. how do i restore my backup-image from 10 days ago (because there's no perfect answer to question 1.)
 
I wanted to stop the proftpd server so went to /etc/xinetd.d/ftp_psa and set "disabled" to "yes" and it stopped it. Next day however it was running again and when I checked the disabled value in ftp_psa had changed back to no.

What's going on? Is Plesk automatically restarting it again? I didn't find a place in Plesk to manage the status of proftpd.
 
Back
Top