Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.802034
Kategorie:FTP
Titel:KnFTPd FTP Server Multiple Commands Remote Buffer Overflow Vulnerabilities
Zusammenfassung:KnFTPd Server is prone to multiple buffer overflow vulnerabilities.
Beschreibung:Summary:
KnFTPd Server is prone to multiple buffer overflow vulnerabilities.

Vulnerability Insight:
The flaws are due to an error while processing the multiple
commands, which can be exploited to cause a buffer overflow by sending a
command with specially-crafted an overly long parameter.

Vulnerability Impact:
Successful exploitation will allow remote attackers to execute
arbitrary code on the system or cause the application to crash.

Affected Software/OS:
KnFTPd Server Version 1.0.0.

Solution:
No known solution was made available for at least one year since the disclosure
of this vulnerability. Likely none will be provided anymore. General solution options are to upgrade to a newer
release, disable respective features, remove the product or replace the product by another one.

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2011-5166
Bugtraq: 20110902 KnFTPd v1.0.0 Multiple Command Remote Buffer Overflow (Google Search)
http://archives.neohapsis.com/archives/bugtraq/2011-09/0015.html
http://www.exploit-db.com/exploits/17819
http://www.exploit-db.com/exploits/17856
http://www.exploit-db.com/exploits/17870
http://www.exploit-db.com/exploits/18089
http://www.osvdb.org/75147
http://secunia.com/advisories/45907
XForce ISS Database: knftpd-multiple-commands-bo(69557)
https://exchange.xforce.ibmcloud.com/vulnerabilities/69557
CopyrightCopyright (C) 2011 Greenbone AG

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.