The host is running ProFTPD and is prone to multiple vulnerabilities.
Successful exploitation may allow execution of arbitrary code or cause a denial-of-service. Impact Level: Application
Upgrade to ProFTPD version 1.3.3c or later, For updates refer to http://www.proftpd.org/
- An input validation error within the 'mod_site_misc' module can be exploited to create and delete directories, create symlinks, and change the time of files located outside a writable directory. - A logic error within the 'pr_netio_telnet_gets()' function in 'src/netio.c' when processing user input containing the Telnet IAC escape sequence can be exploited to cause a stack-based buffer overflow by sending specially crafted input to the FTP or FTPS service.
ProFTPD versions prior to 1.3.3c