Plugin ID | 217 |
Plugin name | Cat Soft Serv-U FTP server prior 5.0.0.6 LIST -I buffer overflow |
Plugin filename | Cat Soft Serv-U FTP server prior 5.0.0.6 LIST -I buffer overflow.plugin |
Plugin filesize | 3517 bytes |
Plugin family | FTP |
Plugin created name | Marc Ruef |
Plugin created email | marc dot ruef at computec dot ch |
Plugin created web | http://www.computec.ch |
Plugin created company | computec.ch |
Plugin created date | 2004/09/13 |
Plugin updated name | Marc Ruef |
Plugin updated email | marc dot ruef at computec dot ch |
Plugin updated web | http://www.computec.ch |
Plugin updated company | computec.ch |
Plugin updated date | 2004/11/13 |
Plugin version | 1.1 |
Plugin changelog | Corrected the plugin structure and added the accuracy values in 1.1 |
Plugin protocol | tcp |
Plugin port | 21 |
Plugin procedure detection | open|sleep|close|pattern_exists 220 Serv-U FTP-Server v[0-4].* OR 220 Serv-U FTP-Server v5.0.0.[0-5]* |
Plugin detection accuracy | 80 |
Plugin comment | This plugin was written with the ATK Attack Editor. |
Bug published name | STORM |
Bug published email | storm at securiteam dot com |
Bug published web | http://www.securiteam.com |
Bug published company | SecuriTeam.com |
Bug published date | 2004/04/19 |
Bug advisory | http://www.securiteam.com/windowsntfocus/5ZP0G2KCKA.html |
Bug affected | Serv-U FTP server prior 5.0.0.6 |
Bug not affected | Serv-U FTP server newer than 5.0.0.6 or other ftp servers |
Bug vulnerability class | Buffer Overflow |
Bug description | The Serv-U FTP server is a well-known ftp server for Windows operating systems. A buffer overflow in the LIST command allows an attacker to crash the server or to run arbitrary code. An attacker needs to send more than 134 bytes with the -I argument. |
Bug solution | If the ftp server is not used it should be de-installed or de-activated. Install the newest patch or bugfix to solve the problem or upgrade to the latest software version which is not vulnerable anymore. Additionally limit unwanted connections and communications with firewalling. |
Bug fixing time | Approx. 20 minutes |
Bug exploit availability | Yes |
Bug exploit url | http://www.securiteam.com/windowsntfocus/5ZP0G2KCKA.html |
Bug remote | Yes |
Bug local | Yes |
Bug severity | High |
Bug popularity | 8 |
Bug simplicity | 7 |
Bug impact | 9 |
Bug risk | 8 |
Bug check tools | An in Perl written proof-of-concept exploit has been published on SecuriTeam.com |
Source Secunia ID | 11430 |
Source SecuriTeam URL | http://www.securiteam.com/windowsntfocus/5ZP0G2KCKA.html |
Source scipID | 620 |
Source Literature | Hacking Exposed: Network Security Secrets & Solutions, Stuart McClure, Joel Scambray and George Kurtz, February 25, 2003, 4th Edition, McGraw-Hill Osborne Media, ISBN 0072227427 |
Source Misc. | http://www.serv-u.com |