27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>PVS</strong> ID: 1812 FAMILY: FTP Servers RISK: HIGH NESSUS ID:11094<br />

Description: The remote WS_FTP server is vulnerable to various buffer overflows which may allow an<br />

attacker to execute arbitrary commands on this host.<br />

Solution: Upgrade to WS_FTP 2.0.3 or higher.<br />

CVE-2001-1021<br />

WFTP < 2.41 RNTO Command Handling DoS<br />

<strong>PVS</strong> ID: 1813 FAMILY: FTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10466<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote WFTP server crashes when it receives the command "RNTO x" right after the login.<br />

An attacker may use this flaw to prevent this host from publishing anything using FTP.<br />

Solution: Upgrade to WFTP 2.41 or higher.<br />

CVE-2000-0648<br />

VXWorks ftpd CEL Command Overflow DoS<br />

<strong>PVS</strong> ID: 1814 FAMILY: FTP Servers RISK: HIGH NESSUS ID:11185<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote VXWorks host can be brought down entirely if a user issues a too long argument to<br />

the CEL ftp command.<br />

Solution: Contact your vendor and reference WindRiver field patch TSR 296292.<br />

CVE-2002-2300<br />

SunFTP Directory Traversal / Overflow<br />

<strong>PVS</strong> ID: 1815 FAMILY: FTP Servers RISK: HIGH NESSUS ID:11373<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote FTP<br />

server (SunFTP) allows a remote attacker to read arbitrary files on the remote host by<br />

adding a double dot in front of their name. In addition to this, it is vulnerable to a buffer<br />

overflow which may allow an attacker to execute arbitrary commands on the remote host.<br />

Solution: The product has been discontinued by the vendor.<br />

CVE-2000-0856<br />

WebWeaver FTP RETR Command Remote DoS<br />

<strong>PVS</strong> ID: 1816 FAMILY: FTP Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11584<br />

Family Internet Services 461

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!