27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Solution: No solution is known at this time.<br />

CVE-2001-0767<br />

GuildFTPd Traversal Arbitrary File Enumeration<br />

<strong>PVS</strong> ID: 1840 FAMILY: FTP Servers RISK: HIGH NESSUS ID:10471<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote FTP server (GuildFTPD) can be used to determine if a given file<br />

exists on the remote host by adding dot-dot-slashes in front of the filename.<br />

Solution: Upgrade according to vendor recommendations.<br />

CVE-2000-0640<br />

Microsoft IIS FTP Status Request DoS<br />

<strong>PVS</strong> ID: 1841 FAMILY: FTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10934<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nIt may<br />

be possible to make the remote FTP server crash by sending the command 'STAT<br />

*?AAAAA....AAAAA' An attacker may use this flaw to prevent your FTP server from<br />

working properly.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2002-0073<br />

WarFTPd Multiple Command CPU Consumption DoS<br />

<strong>PVS</strong> ID: 1842 FAMILY: FTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10822<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote WarFTPd server is running a 1.71 version. It is possible for a remote user to cause a<br />

denial of service on a host running Serv-U FTP Server, G6 FTP Server or WarFTPd Server.<br />

Repeatedly submitting an 'a:/' GET or RETR request, appended with arbitrary data, will<br />

cause the CPU usage to spike to 100%.<br />

Solution: Upgrade to the latest version of WarFTPd.<br />

CVE Not available<br />

ProFTPd < 1.2.0pre6 mkdir Command Overflow<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 1843 FAMILY: FTP Servers RISK: HIGH NESSUS ID:10189<br />

Family Internet Services 468

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!