| VID |
16110 |
| Severity |
40 |
| Port |
21 |
| Protocol |
TCP |
| Class |
FTP |
| Detailed Description |
The Crob FTP Server, according to its banner, has two buffer overflow vulnerabilities. Crob FTP Server is a FTP server for Microsoft Windows operating systems. Crob FTP Server version 3.6.1 and earlier versions are vulnerable to two buffer overflow vulnerabilities, which can be exploited by a remote authenticated attacker to execute arbitrary code within the context of the affected service:
1) A boundary error in the argument handling can be exploited to cause a stack-based buffer overflow by e.g. sending the "STOR" command followed by the "RMD" command with specially crafted overly long arguments. 2) A boundary error in the handling of certain characters can be exploited to cause a heap-based buffer overflow by sending e.g. the "LIST" or "NLST" command with a specially crafted overly long argument.
* Note: This check solely relied on the banner of the remote FTP server to assess this vulnerability, so this might be a false positive. Although the version is 3.6.1 and the build is 263 or later, this check will alert as a positive, and in this case, please ignore the alert.
* References: http://secunia.com/advisories/15585/ http://security.lss.hr/en/index.php?page=details&ID=LSS-2005-06-06
* Platforms Affected: Crob Software Studio, Crob FTP Server version 3.6.1 and earlier versions Microsoft Windows Any version |
| Recommendation |
Upgrade to the latest version of Crob FTP Server (3.6.1 build 263 or later), available from the Crob FTP Server Web site at http://crob.net/studio/ftpserver_cn/index.html |
| Related URL |
CVE-2005-1873 (CVE) |
| Related URL |
13847,13848 (SecurityFocus) |
| Related URL |
20876,20877 (ISS) |
|