Home Page | Skip to Navigation | Skip to Content | Skip to Search | Skip to Footer

Update Protection against ProFTPD 1.3.3c Compromised Source Remote Trojan

Subscribe

Check Point Reference: CPAI-2010-151
Date Published:
Severity:
Last Updated:
Source: Exploit Database 15662 
Protection Provided by: Security Gateway
  • R75
  • R71
  • R70
VPN-1
  • NGX R65
VSX
  • NGX R65
IPS-1
  • IPS-1
  • IPS-1 NGX R65
Who is Vulnerable?
ProFTPD 1.3.3c
Vulnerability Description
The main distribution server of the ProFTPD project was compromised. The attackers used an unpatched issue of FTPD daemon to gain access to the server and used their privileges to replace the source files for ProFTPD 1.3.3c with a version which contained a bcakdoor. The backdoor allows users remote code access to systems which run the modified version of the ProFTPD daemon.
Vulnerability Details
The backdoor allows users remote code access to systems which run the modified version of the ProFTPD daemon.

Protection Overview
The protection will detect and block attempts to access FTP commands while providing the argument 'ACIDBITCHEZ', which could be an attempt to exploit a trojan-ed version of the ProFTPD server.

In order for the protection to be activated, update your Security Gateway/VPN-1 product to the latest IPS/SmartDefense update. For information on how to update IPS/SmartDefense, go to SBP-2006-05Protection taband select the version of your choice.

To configure the defense, select your product from the list below and follow the related protection steps.

Security Gateway: R75

How Can I Protect My Network?
1. In the IPS tab, click Protections > By Protocol > IPS Software Blade > Application Intelligence > FTP.
2. In the right pane, double-click the ProFTPD Server 1.3.3.c Backdoor Credentials Elevation protection.
3. In the Protection Details window, click on Edit. Choose the protection's Action (Override IPS Policy with: Prevent/Detect), and apply Additional Settings.
4. Install policy on all modules.

How Do I Know if My Network is Under Attack?
SmartView Tracker will log the following entries: 

Attack Name: FTP Enforcement Violation
Attack Information: ProFTPD Sever 1.3.3.c backdoor credentials elevation

Security Gateway: R70/R71

How Can I Protect My Network?
1. In the IPS tab, click Protections > By Protocol > Application Intelligence > FTP.
2. In the right pane, double-click the ProFTPD Server 1.3.3.c Backdoor Credentials Elevation protection.
3. In the Protection Details window, click on Edit. Choose the protection's Action (Override IPS Policy with: Prevent/Detect), and apply Additional Settings.
4. Install policy on all modules.

How Do I Know if My Network is Under Attack?
SmartView Tracker will log the following entries: 

Attack Name: FTP Enforcement Violation
Attack Information: ProFTPD Sever 1.3.3.c backdoor credentials elevation

VPN-1 NGX R65 & VSX NGX R65

How Can I Protect My Network?
1. In the SmartDefense tab, click Application Intelligence > FTP ProFTPD Server 1.3.3.c Backdoor Credentials Elevation.
2. In the configuration pane, under Settings > Mode, check Active.
3. Install policy on all modules.

How Do I Know if My Network is Under Attack?
SmartView Tracker will log the following entries: 

Attack Name: FTP Enforcement Violation
Attack Information: ProFTPD Sever 1.3.3.c backdoor credentials elevation

IPS-1 & IPS-1 NGX R65

How Can I Protect My Network?
1. In the IPS-1 Policy Manager, click on the Protection tab.
2. In the Protection tree, click Application Intelligence > FTP, and select the FTP Command Attacks protection group
3. Click Trojaned ProFTPD ACIDBITCHEZ attempt (IPS-1 NGX R65 only).
4. In the configuration pane, under Settings, check Active.
5. Click on Install Policy.

How Do I Know if My Network is Under Attack?
Upon attack, the following entries will be logged:

Alert Name: FTP Commands
Description: Trojaned ProFTPD ACIDBITCHEZ attempt