Lucene search

K
openvasCopyright (C) 2004 David MaciejakOPENVAS:136141256231014256
HistoryNov 03, 2005 - 12:00 a.m.

BlackJumboDog FTP server multiple command overflow

2005-11-0300:00:00
Copyright (C) 2004 David Maciejak
plugins.openvas.org
21

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

6.8 Medium

AI Score

Confidence

Low

0.125 Low

EPSS

Percentile

95.4%

The remote host is running BlackJumboDog FTP server.

This FTP server fails to properly check the length of parameters
in multiple FTP commands, most significant of which is USER, resulting in a stack overflow.

# SPDX-FileCopyrightText: 2004 David Maciejak
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.14256");
  script_version("2023-07-21T05:05:22+0000");
  script_tag(name:"last_modification", value:"2023-07-21 05:05:22 +0000 (Fri, 21 Jul 2023)");
  script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
  script_cve_id("CVE-2004-1439");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/10834");
  script_xref(name:"OSVDB", value:"8273");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:P/I:P/A:P");
  script_name("BlackJumboDog FTP server multiple command overflow");
  script_category(ACT_MIXED_ATTACK);
  script_tag(name:"qod_type", value:"remote_analysis");
  script_copyright("Copyright (C) 2004 David Maciejak");
  script_family("FTP");
  script_dependencies("ftpserver_detect_type_nd_version.nasl");
  script_require_ports("Services/ftp", 21);
  script_mandatory_keys("ftp/blackjumbodog/detected");

  script_tag(name:"solution_type", value:"VendorFix");

  script_tag(name:"solution", value:"Upgrade to version 3.6.2 or newer.");

  script_tag(name:"summary", value:"The remote host is running BlackJumboDog FTP server.

  This FTP server fails to properly check the length of parameters
  in multiple FTP commands, most significant of which is USER, resulting in a stack overflow.");

  script_tag(name:"impact", value:"With a specially crafted request, an attacker can execute arbitrary code
  resulting in a loss of integrity, and/or availability.");

  exit(0);
}

include("ftp_func.inc");
include("misc_func.inc");
include("port_service_func.inc");

port = ftp_get_port(default:21);
banner = ftp_get_banner(port:port);
if ( ! banner ) exit(0);

#220 FTP ( BlackJumboDog(-RAS) Version 3.6.1 ) ready
#220 FTP ( BlackJumboDog Version 3.6.1 ) ready

if( "BlackJumboDog" >< banner )
{
  if (safe_checks())
  {
    if ( egrep(pattern:"^220 .*BlackJumboDog.* Version 3\.([0-5]\.[0-9]+|6\.[01])", string:banner ) )
      security_message(port);
  }
  else
  {
    req1 = string("USER ", crap(300), "\r\n");
    soc=open_sock_tcp(port);
    if ( ! soc ) exit(0);
    send(socket:soc, data:req1);
    close(soc);
    sleep(1);
    soc2 = open_sock_tcp(port);
    if (! soc2 || ! ftp_recv_line(socket:soc))
    {
      security_message(port);
    }
    else
      close(soc2);
    exit(0);
  }
}

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

6.8 Medium

AI Score

Confidence

Low

0.125 Low

EPSS

Percentile

95.4%

Related for OPENVAS:136141256231014256