|
Family: FTP --> Category: infos
Multiple WarFTPd DoS Vulnerability Scan
Vulnerability Scan Summary Checks if the version of the remote warftpd
Detailed Explanation for this Vulnerability Test
The remote WarFTPd server is running a 1.71 version.
It is possible for a remote user to cause a denial of
service on a host running Serv-U FTP Server, G6 FTP Server
or WarFTPd Server. Repeatedly submitting an 'a:/' GET or
RETR request, appended with arbitrary data,
will cause the CPU usage to spike to 100%.
Reference: http://www.securityfocus.com/bid/2698
Solution : upgrade to the latest version of WarFTPd
Threat Level: Medium
Click HERE for more information and discussions on this network vulnerability scan.
|