27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

CVE-2001-0247<br />

FTP Server 'glob' Function Overflow<br />

<strong>PVS</strong> ID: 1836 FAMILY: FTP Servers RISK: HIGH NESSUS ID:10648<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a globbing overflow.\n\nIt may be possible<br />

to make the remote FTP server crash by creating a large directory structure and then<br />

attempting to list it using wildcards. This is usually known as the 'ftp glob overflow' attack.<br />

An attacker can use this flaw to execute arbitrary code on the remote server, which could<br />

lead to remote shell access.<br />

Solution: Upgrade your FTP server and/or libc. Consider removing directories writable by<br />

'anonymous'.<br />

CVE-2001-0247<br />

Serv-U < 2.5e CWD Command Path Disclosure<br />

<strong>PVS</strong> ID: 1837 FAMILY: FTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11392<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote FTP server discloses the full path to its root through a CWD<br />

command done to a non-existant directory.<br />

Solution: Upgrade to Serv-U 2.5e or higher.<br />

CVE-1999-0838<br />

Serv-U < 2.5i CD Command Traversal Directory / File Access<br />

<strong>PVS</strong> ID: 1838 FAMILY: FTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10565<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw which allows attackers to retrieve<br />

sensitive files or data.\n\nIt is possible to break out of the remote FTP chroot by appending<br />

%20s in the CWD command, as in : CWD %20.. This problem allows an attacker to browse<br />

the entire remote file system.<br />

Solution: Upgrade to Serv-U 2.5i or higher.<br />

CVE-2001-0054<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

GuildFTPd Directory Traversal Arbitrary File Access<br />

<strong>PVS</strong> ID: 1839 FAMILY: FTP Servers RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw which allows attackers to retrieve<br />

sensitive files or data.\n\nVersion 0.97 of GuildFTPd was detected. A security vulnerability<br />

in this product allows anyone with a valid FTP login to read arbitrary files on the system.<br />

Family Internet Services 467

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!