Lucene search

K
nessusThis script is Copyright (C) 2003-2011 Digital Defense, Inc.DDI_WARFTPD_CWD_OVERFLOW.NASL
HistoryJan 22, 2003 - 12:00 a.m.

WarFTPd CWD/MKD Command Overflow

2003-01-2200:00:00
This script is Copyright (C) 2003-2011 Digital Defense, Inc.
www.tenable.com
11

The version of the War FTP Daemon running on this host is vulnerable to a buffer overflow attack. This is due to improper bounds checking within the code that handles both the CWD and MKD commands. By exploiting this vulnerability, it is possible to crash the server.

#
# This script was written by Erik Tayler <[email protected]>
#
# See the Nessus Scripts License for details
#
# Changes by Tenable:
# - Revised plugin title (1/22/2009)
# - Revised plugin title (2/04/2009)

include("compat.inc");

if(description)
{
	script_id(11205);
	script_version("1.17");

	script_cve_id("CVE-2000-0131");
	script_bugtraq_id(966);
	
	script_name(english:"WarFTPd CWD/MKD Command Overflow");
	script_summary(english:"War FTP Daemon CWD/MKD Buffer Overflow");

	script_set_attribute(attribute:"synopsis", value:
"The remote FTP service is prone to a buffer overflow attack.");
	script_set_attribute(attribute:"description", value:
"The version of the War FTP Daemon running on this host is vulnerable
to a buffer overflow attack.  This is due to improper bounds checking
within the code that handles both the CWD and MKD commands.  By
exploiting this vulnerability, it is possible to crash the server.");
	script_set_attribute(attribute:"see_also", value:
"https://seclists.org/bugtraq/2000/Feb/44");
	script_set_attribute(attribute:"see_also", value:
"https://seclists.org/bugtraq/2000/Feb/71");
	script_set_attribute(attribute:"solution", value:
"Upgrade to WarFTPd version 1.67-4 or later.");
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:S/C:N/I:N/A:P");
 script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"true");
	script_set_attribute(attribute:"plugin_publication_date", value:
"2003/01/22");
 script_set_attribute(attribute:"vuln_publication_date", value: "2000/02/03");
 script_cvs_date("Date: 2018/11/15 20:50:22");
	script_set_attribute(attribute:"plugin_type", value:"remote");
	script_end_attributes();

	script_category(ACT_ATTACK);
	script_copyright(english:"This script is Copyright (C) 2003-2011 Digital Defense, Inc.");
	script_family(english:"FTP");
	script_require_ports("Services/ftp", 21);
	script_dependencies("ftpserver_detect_type_nd_version.nasl");
	exit(0);
}


include("ftp_func.inc");

port = get_ftp_port(default: 21);

r = get_ftp_banner(port:port);
if (!r) exit(1);
	
	if(("WAR-FTPD 1.66x4" >< r) || ("WAR-FTPD 1.67-03" >< r))
	{
		security_warning(port);
	}
Related for DDI_WARFTPD_CWD_OVERFLOW.NASL