Korean
<< Back
VID 16134
Severity 40
Port 21
Protocol TCP
Class FTP
Detailed Description The installed version of Serv-U 7.x is earlier than 7.3.0.1 and thus reportedly affected by the following issues :

- An authenticated remote attacker can cause the service to consume all CPU time on the remote host by specifying a Windows port (eg, 'CON:') when using the STOU command provided he has write access to a directory.

- An authenticated remote attacker can overwrite or create arbitrary files via a directory traversal attack in the RNTO command.

- An authenticated remote attacker may be able to upload a file to the current Windows directory with rename by placing the destination in '\' (ie, 'My Computer').


* Note: This check solely relied on the version number of the remote FTP server to assess this vulnerability, so this might be a false positive.

* References:
http://www.rhinosoft.com/KnowledgeBase/KBArticle.asp?RefNo=1769
http://www.serv-u.com/releasenotes/

* Platforms Affected:
Rhino Software, Inc., Serv-U FTP Server 7.3.0.1 and prior
Microsoft Windows Any version
Recommendation Upgrade to latest version of Serv-U (7.3.0.1 or later), available from Serv-U Web site at http://www.serv-u.com/
Related URL CVE-2008-4500,CVE-2008-4501 (CVE)
Related URL 31556,31563 (SecurityFocus)
Related URL (ISS)