VID |
16145 |
Severity |
30 |
Port |
21 |
Protocol |
TCP |
Class |
FTP |
Detailed Description |
The remote host is running Serv-U File Server, an FTP server for Windows. According to its banner, the installed version of Serv-U is earlier than 11.1.0.3, and The remote FTPS server accepts unencrypted commands on an encrypted port if SSL negotiation fails. This security bypass could allow an attacker to perform a man-in-the-middle attack, intercept credentials and modify files.
* Note: This check solely relied on the version number of the remote FTP server to assess this vulnerability, so this might be a false positive.
* References: http://www.serv-u.com/releasenotes/
* Platforms Affected: Rhino Software, Inc., Serv-U FTP Server 11.1.0.3 prior Microsoft Windows Any version |
Recommendation |
Upgrade to latest version of Serv-U (11.1.0.3 or later), available from Serv-U Web site at http://www.serv-u.com/ |
Related URL |
(CVE) |
Related URL |
50881 (SecurityFocus) |
Related URL |
(ISS) |
|