CVE-2025-11947

4.5 MEDIUM

📋 TL;DR

A heap-based buffer overflow vulnerability exists in bftpd's configuration file handler when processing group expansions. This allows local attackers to potentially execute arbitrary code or crash the service. Only bftpd installations up to version 6.2 are affected.

💻 Affected Systems

Products:
  • bftpd
Versions: Up to and including version 6.2
Operating Systems: All platforms running bftpd
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability is in the configuration parser, so any bftpd installation using configuration files is affected.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local privilege escalation leading to full system compromise via arbitrary code execution as the bftpd process user.

🟠

Likely Case

Service crash (denial of service) due to memory corruption, disrupting FTP services.

🟢

If Mitigated

Limited impact with proper access controls and process isolation, potentially just service restart.

🌐 Internet-Facing: LOW - Attack requires local host access, cannot be exploited remotely.
🏢 Internal Only: MEDIUM - Local attackers with access to the system could exploit this, but complexity is high.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: HIGH

Exploit details are publicly available but attacks are described as highly complex and difficult to execute.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 6.3 or later

Vendor Advisory: Not provided by vendor (vendor did not respond to disclosure)

Restart Required: Yes

Instructions:

1. Download latest bftpd version from official source. 2. Stop bftpd service. 3. Install updated version. 4. Restart bftpd service.

🔧 Temporary Workarounds

Restrict configuration file access

all

Limit write access to bftpd configuration files to prevent malicious modifications

chmod 640 /etc/bftpd.conf
chown root:root /etc/bftpd.conf

Disable group expansion

all

Remove or comment out group expansion directives in configuration if not needed

# Comment out any 'expand_groups' or group-related directives in bftpd.conf

🧯 If You Can't Patch

  • Implement strict access controls to prevent local users from modifying bftpd configuration files
  • Run bftpd in a container or chroot jail to limit potential damage from exploitation

🔍 How to Verify

Check if Vulnerable:

Check bftpd version: 'bftpd -v' or examine installed package version

Check Version:

bftpd -v

Verify Fix Applied:

Verify version is 6.3 or higher: 'bftpd -v | grep -q "6\.[3-9]\|7\.[0-9]"'

📡 Detection & Monitoring

Log Indicators:

  • Segmentation fault or crash logs from bftpd
  • Unexpected process termination

Network Indicators:

  • Sudden FTP service unavailability
  • Connection resets on FTP port

SIEM Query:

source="bftpd.log" AND ("segmentation fault" OR "crash" OR "SIGSEGV")

🔗 References

📤 Share & Export