First published: Fri Oct 15 2004(Updated: )
ProFTPD 1.2.x, including 1.2.8 and 1.2.10, responds in a different amount of time when a given username exists, which allows remote attackers to identify valid usernames by timing the server response.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ProFTPD | >=1.2.0<=1.2.10 | |
ProFTPD | =1.2_pre10 | |
ProFTPD | =1.2_pre5 | |
ProFTPD | =1.2.3 | |
ProFTPD | =1.2.1 | |
ProFTPD | =1.2.7_rc3 | |
ProFTPD | =1.2.4 | |
ProFTPD | =1.2_pre2 | |
ProFTPD | =1.2.7_rc2 | |
ProFTPD | =1.2 | |
ProFTPD | =1.2.9 | |
ProFTPD | =1.2_pre8 | |
ProFTPD | =1.2_pre7 | |
ProFTPD | =1.2.0_rc1 | |
ProFTPD | =1.2_pre6 | |
ProFTPD | =1.2.9_rc2 | |
ProFTPD | =1.2.0_rc2 | |
ProFTPD | =1.2_pre4 | |
ProFTPD | =1.2_pre1 | |
ProFTPD | =1.2.7 | |
ProFTPD | =1.2.2_rc1 | |
ProFTPD | =1.2.6 | |
ProFTPD | =1.2.8_rc1 | |
ProFTPD | =1.2.9_rc1 | |
ProFTPD | =1.2.0_rc3 | |
ProFTPD | =1.2.7_rc1 | |
ProFTPD | =1.2.8 | |
ProFTPD | =1.2_pre9 | |
ProFTPD | =1.2.2_rc3 | |
ProFTPD | =1.2.9_rc3 | |
ProFTPD | =1.2.8_rc2 | |
ProFTPD | =1.2.5 | |
ProFTPD | =1.2_pre11 | |
ProFTPD | =1.2_pre3 | |
ProFTPD | =1.2.2 | |
ProFTPD | =1.2.5_rc1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-1602 is classified as a high-severity vulnerability due to its potential to expose valid usernames to attackers.
CVE-2004-1602 exploits an information leakage issue that allows attackers to determine valid usernames by analyzing response times of the ProFTPD server.
To fix CVE-2004-1602, upgrade to a version of ProFTPD that is later than 1.2.10 where the vulnerability has been patched.
CVE-2004-1602 affects ProFTPD versions 1.2.0 through 1.2.10 and their associated pre-release versions.
CVE-2004-1602 can still be a concern in environments that have not updated their ProFTPD software, particularly those using outdated versions.