Lucene search

K
nessusThis script is Copyright (C) 2021-2024 and is owned by Tenable, Inc. or an Affiliate thereof.NUCLEUS_FTP_MULTIPLE_VULNS.NBIN
HistoryNov 11, 2021 - 12:00 a.m.

Nucleus FTP Server Multiple Vulnerabilities (NUCLEUS:13)

2021-11-1100:00:00
This script is Copyright (C) 2021-2024 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
31

A FTP server running on the remote host is possibly affected by multiple vulnerabilities :

  • FTP server does not properly validate the length of the USER command, leading to stack-based buffer overflows. This may result in denial-of-service conditions and remote code execution.
    (CVE-2021-31886)

  • FTP server does not properly validate the length of the PWD/XPWD command, leading to stack-based buffer overflows. This may result in denial-of-service conditions and remote code execution.
    (CVE-2021-31887)

  • FTP server does not properly validate the length of the MKD/XMKD command, leading to stack-based buffer overflows. This may result in denial-of-service conditions and remote code execution.
    (CVE-2021-31888)

Note that Nessus reports these vulnerabilities based on the presence of the Nucleus FTP server. These vulnerabilities might have been mitigated.

Binary data nucleus_ftp_multiple_vulns.nbin
VendorProductVersionCPE
nucleus_netnucleus_netx-cpe:/a:nucleus_net:nucleus_net
Related for NUCLEUS_FTP_MULTIPLE_VULNS.NBIN