| VID |
16145 |
| Severity |
30 |
| Port |
21 |
| Protocol |
TCP |
| Class |
FTP |
| Detailed Description |
The remote host is running Serv-U File Server, an FTP server for Windows. According to its banner, the installed version of Serv-U is earlier than 11.1.0.3, and The remote FTPS server accepts unencrypted commands on an encrypted port if SSL negotiation fails. This security bypass could allow an attacker to perform a man-in-the-middle attack, intercept credentials and modify files.
* Note: This check solely relied on the version number of the remote FTP server to assess this vulnerability, so this might be a false positive.
* References: http://www.serv-u.com/releasenotes/
* Platforms Affected: Rhino Software, Inc., Serv-U FTP Server 11.1.0.3 prior Microsoft Windows Any version |
| Recommendation |
Upgrade to latest version of Serv-U (11.1.0.3 or later), available from Serv-U Web site at http://www.serv-u.com/ |
| Related URL |
(CVE) |
| Related URL |
50881 (SecurityFocus) |
| Related URL |
(ISS) |
|