VID |
16117 |
Severity |
40 |
Port |
21 |
Protocol |
TCP |
Class |
FTP |
Detailed Description |
The NetTerm NetFTPd server, according to its banner, has a buffer overflow vulnerability via the USER command. NetTerm versions 5.1.1 and earlier are vulnerable to a buffer overflow vulnerability in the NetFTPd program. When logging in, by sending a specially-crafted FTP request containing a long USER command, a remote attacker could exploit this vulnerability to execute arbitrary code on the affected host.
* Note: This check solely relied on the banner of the remote FTP server to assess this vulnerability, so this might be a false positive.
* References: http://secunia.com/advisories/15140/
* Platforms Affected: InterSoft International, Inc., NetTerm versions prior to 5.1.1.1 Microsoft Windows Any version |
Recommendation |
NetTerm version 5.1.1.1 and later versions no longer have the NetFTPd function installed. Recommend that de-install this package and use another solution or package. |
Related URL |
CVE-2005-1323 (CVE) |
Related URL |
13396 (SecurityFocus) |
Related URL |
20285 (ISS) |
|