| VID |
28100 |
| Severity |
40 |
| Port |
139,445 |
| Protocol |
TCP |
| Class |
SMB |
| Detailed Description |
The CuteFTP client program, according to its version number, has multiple buffer overflow conditions (1). CuteFTP is a commercially available FTP client for the Microsoft Windows platforms distributed by GlobalScape. GlobalScape CuteFTP version 5.0 XP and possibly earlier versions are vulnerable to multiple buffer overflow vulnerabilities via long URL and the LIST command. A remote attacker could create a specially crafted FTP server, to hijack the memory pointer and overflow a buffer, and then could persuade a target user to visit it. Once the FTP server is connected, a remote attacker could could overflow a buffer, which cause a denial of service or arbitrary code execution.
* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.
* References: http://archives.neohapsis.com/archives/bugtraq/2003-01/0123.html http://archives.neohapsis.com/archives/bugtraq/2003-02/0087.html http://archives.neohapsis.com/archives/bugtraq/2003-06/0136.html
* Platforms Affected: GlobalSCAPE, Inc., CuteFTP 5.0 XP Microsoft Windows Any version |
| Recommendation |
Upgrade to the latest version of CuteFTP (5.0.2.0 or later), available from the GlobalSCAPE Web site at http://www.globalscape.com/cuteftp |
| Related URL |
(CVE) |
| Related URL |
6642,6786 (SecurityFocus) |
| Related URL |
11093,11275 (ISS) |
|