HP-UX FTP Daemon PASS Format String

2000-08-06T00:00:00
ID OSVDB:389
Type osvdb
Reporter OSVDB
Modified 2000-08-06T00:00:00

Description

Vulnerability Description

This host appears to be running a version of the HPUX FTP daemon which is vulnerable to a format string vulnerability in the PASS command. A potential intruder could exploit this vulnerability to gain remote access with super-user privileges (root).

Technical Description

Sends 'PASS %.2048d' and checks to see if the server disconnected.

Solution Description

The vendor has released a patch that fixes this issue. The patch can be found by navigating HP's web site, starting with the following URL: http://welcome.hp.com/country/us/eng/software_drivers.htm

Short Description

This host appears to be running a version of the HPUX FTP daemon which is vulnerable to a format string vulnerability in the PASS command. A potential intruder could exploit this vulnerability to gain remote access with super-user privileges (root).

References:

CVE-2000-0699 Bugtraq ID: 1560