Lucene search

K
openvasCopyright (C) 2004 David MaciejakOPENVAS:136141256231014372
HistoryNov 03, 2005 - 12:00 a.m.

wu-ftpd S/KEY authentication overflow

2005-11-0300:00:00
Copyright (C) 2004 David Maciejak
plugins.openvas.org
11

6.4 Medium

AI Score

Confidence

Low

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.075 Low

EPSS

Percentile

94.1%

The remote Wu-FTPd server seems to be vulnerable to a remote overflow.

# SPDX-FileCopyrightText: 2004 David Maciejak
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

CPE = "cpe:/a:washington_university:wu-ftpd";

# Ref: Michal Zalewski & Michael Hendrickx

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.14372");
  script_version("2023-08-03T05:05:16+0000");
  script_tag(name:"last_modification", value:"2023-08-03 05:05:16 +0000 (Thu, 03 Aug 2023)");
  script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
  script_cve_id("CVE-2004-0185");
  script_xref(name:"OSVDB", value:"2715");
  script_xref(name:"RHSA", value:"RHSA-2004:096-09");
  script_xref(name:"DSA", value:"DSA-457-1");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:C/I:C/A:C");
  script_name("wu-ftpd S/KEY authentication overflow");
  script_category(ACT_GATHER_INFO);
  script_family("FTP");
  script_copyright("Copyright (C) 2004 David Maciejak");
  script_dependencies("gb_wu-ftpd_detect.nasl");
  script_require_ports("Services/ftp", 21);
  script_mandatory_keys("wu-ftpd/installed");

  script_xref(name:"URL", value:"http://www.wu-ftpd.org");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/8893");

  script_tag(name:"summary", value:"The remote Wu-FTPd server seems to be vulnerable to a remote overflow.");

  script_tag(name:"insight", value:"This version contains a remote overflow if s/key support is enabled.

  The skey_challenge function fails to perform bounds checking on the
  name variable resulting in a buffer overflow.

  With a specially crafted request, an attacker can execute arbitrary
  code resulting in a loss of integrity and/or availability.

  It appears that this vulnerability may be exploited prior to authentication.
  It is reported that S/Key support is not enabled by default, though some
  operating system distributions which ship Wu-Ftpd may have it enabled.");

  script_tag(name:"solution", value:"Upgrade to Wu-FTPd 2.6.3 when available or disable SKEY or apply the
  patches available at the referenced vendor homepage.");

  script_tag(name:"solution_type", value:"VendorFix");
  script_tag(name:"qod_type", value:"remote_banner_unreliable");

  exit(0);
}

include("version_func.inc");
include("host_details.inc");

if( ! port = get_app_port( cpe:CPE ) ) exit( 0 );
if( ! vers = get_app_version( cpe:CPE, port:port ) ) exit( 0 );

if( egrep( pattern:"^(2\.(5\.|6\.[012]))", string:vers ) ) {
  report = report_fixed_ver( installed_version:vers, fixed_version:"See references" );
  security_message( port:port, data:report );
  exit( 0 );
}

exit( 99 );

6.4 Medium

AI Score

Confidence

Low

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.075 Low

EPSS

Percentile

94.1%