|
Family: Gain a shell remotely --> Category: denial
WFTPD APPE Command Buffer Overflow Vulnerability Vulnerability Scan
Vulnerability Scan Summary Checks for appe command buffer overflow vulnerability in WFTPD
Detailed Explanation for this Vulnerability Test
Synopsis :
The remote FTP server is affected by a buffer overflow vulnerability.
Description :
The remote host appears to be using WFTPD, an FTP server for Windows.
The version of WFTPD installed on the remote host contains a stack-
based buffer overflow vulnerability that can be exploited by an
authenticated, possibly anonymous, user with a specially-crafted APPE
command to crash the affected application or execute arbitrary code on
the affected host.
See also :
http://lists.grok.org.uk/pipermail/full-disclosure/2006-November/050577.html
Solution :
Unknown at this time.
Threat Level:
Medium / CVSS Base Score : 4
(AV:R/AC:L/Au:R/C:P/A:P/I:P/B:N)
Click HERE for more information and discussions on this network vulnerability scan.
|