The remote host seems to be running TYPSoft FTP 1.10 or earlier. TYPESoft FTP Server is prone to a remote denial of service vulnerability that may allow an attacker to cause the server to crash. No known solution was made available for at least one year since the disclosure of this vulnerability
Reporter | Title | Published | Views | Family All 5 |
---|---|---|---|---|
![]() | TYPSoft FTP 1.10 | 3 Nov 200500:00 | – | openvas |
![]() | CVE-2004-0325 | 31 Dec 200405:00 | – | cve |
![]() | CVE-2004-0325 | 18 Mar 200405:00 | – | cvelist |
![]() | CVE-2004-0325 | 31 Dec 200405:00 | – | nvd |
![]() | TYPSoft FTP Server 1.10 Invalid Path Request DoS | 25 Feb 200400:00 | – | nessus |
Source | Link |
---|---|
securityfocus | www.securityfocus.com/bid/9702 |
# SPDX-FileCopyrightText: 2004 Audun Larsen
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.12075");
script_version("2023-08-01T13:29:10+0000");
script_tag(name:"last_modification", value:"2023-08-01 13:29:10 +0000 (Tue, 01 Aug 2023)");
script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
script_cve_id("CVE-2004-0325");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/9702");
script_tag(name:"cvss_base", value:"2.1");
script_tag(name:"cvss_base_vector", value:"AV:L/AC:L/Au:N/C:N/I:N/A:P");
script_name("TYPSoft FTP 1.10");
script_category(ACT_GATHER_INFO);
script_tag(name:"qod_type", value:"remote_banner");
script_copyright("Copyright (C) 2004 Audun Larsen");
script_family("Denial of Service");
script_dependencies("ftpserver_detect_type_nd_version.nasl");
script_require_ports("Services/ftp", 21);
script_mandatory_keys("ftp/typsoft/detected");
script_tag(name:"summary", value:"The remote host seems to be running TYPSoft FTP 1.10 or earlier.");
script_tag(name:"impact", value:"TYPESoft FTP Server is prone to a remote denial of service vulnerability
that may allow an attacker to cause the server to crash.");
script_tag(name:"solution_type", value:"WillNotFix");
script_tag(name:"solution", value:"No known solution was made available for at least one year
since the disclosure of this vulnerability. Likely none will be provided anymore.
General solution options are to upgrade to a newer release, disable respective features,
remove the product or replace the product by another one.");
exit(0);
}
include("ftp_func.inc");
include("misc_func.inc");
include("port_service_func.inc");
port = ftp_get_port(default:21);
banner = ftp_get_banner(port:port);
if ( ! banner ) exit(0);
if(egrep(pattern:".*TYPSoft FTP Server (0\.|1\.[0-9][^0-9]|1\.10[^0-9])", string:banner) )
security_message(port);
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo