VID |
16134 |
Severity |
40 |
Port |
21 |
Protocol |
TCP |
Class |
FTP |
Detailed Description |
The installed version of Serv-U 7.x is earlier than 7.3.0.1 and thus reportedly affected by the following issues :
- An authenticated remote attacker can cause the service to consume all CPU time on the remote host by specifying a Windows port (eg, 'CON:') when using the STOU command provided he has write access to a directory.
- An authenticated remote attacker can overwrite or create arbitrary files via a directory traversal attack in the RNTO command.
- An authenticated remote attacker may be able to upload a file to the current Windows directory with rename by placing the destination in '\' (ie, 'My Computer').
* Note: This check solely relied on the version number of the remote FTP server to assess this vulnerability, so this might be a false positive.
* References: http://www.rhinosoft.com/KnowledgeBase/KBArticle.asp?RefNo=1769 http://www.serv-u.com/releasenotes/
* Platforms Affected: Rhino Software, Inc., Serv-U FTP Server 7.3.0.1 and prior Microsoft Windows Any version |
Recommendation |
Upgrade to latest version of Serv-U (7.3.0.1 or later), available from Serv-U Web site at http://www.serv-u.com/ |
Related URL |
CVE-2008-4500,CVE-2008-4501 (CVE) |
Related URL |
31556,31563 (SecurityFocus) |
Related URL |
(ISS) |
|