Family: Debian Local Security Checks --> Category: infos
[DSA032] DSA-032-1 proftpd Vulnerability Scan
Vulnerability Scan Summary
Detailed Explanation for this Vulnerability Test
The following problems have been reported for the version
of proftpd in Debian 2.2 (potato):
There is a configuration error in the postinst script, when the user enters
'yes', when asked if anonymous access should be enabled. The postinst script
wrongly leaves the 'run as uid/gid root' configuration option in
/etc/proftpd.conf, and adds a 'run as uid/gid nobody' option that has no
There is a bug that comes up when /var is a symlink, and proftpd is
restarted. When stopping proftpd, the /var symlink is removed
started again a file named /var is created.
The above problems have been corrected in proftpd-1.2.0pre10-2.0potato1. We
recommend you upgrade your proftpd package immediately.
Solution : http://www.debian.org/security/2001/dsa-032
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.