Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.12037
Category:FTP
Title:Serv-U FTP Server SITE CHMOD Command Stack Overflow Vulnerability
Summary:The remote host is running Serv-U FTP server.;; There is a bug in the way this server handles arguments to the SITE CHMOD requests.
Description:Summary:
The remote host is running Serv-U FTP server.

There is a bug in the way this server handles arguments to the SITE CHMOD requests.

Vulnerability Impact:
This flaw may allow an attacker to trigger a buffer overflow against
this server, which may allow him to disable this server remotely or to execute arbitrary code on this host.

Solution:
Upgrade to Serv-U FTP Server version 4.2 or later.

CVSS Score:
8.5

CVSS Vector:
AV:N/AC:M/Au:S/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2004-2111
BugTraq ID: 9483
http://www.securityfocus.com/bid/9483
BugTraq ID: 9675
http://www.securityfocus.com/bid/9675
Bugtraq: 20040124 [SST]ServU MDTM command remote buffero verflow adv (Google Search)
http://archives.neohapsis.com/archives/bugtraq/2004-01/0249.html
Bugtraq: 20040126 Serv-U ftp 4.2 site chmod long_file_name exploit (Google Search)
http://marc.info/?l=bugtraq&m=107513654005840&w=2
http://securitytracker.com/id?1008841
XForce ISS Database: servu-chmodcommand-execute-code(14931)
https://exchange.xforce.ibmcloud.com/vulnerabilities/14931
Common Vulnerability Exposure (CVE) ID: CVE-2004-2533
http://www.osvdb.org/3713
http://securitytracker.com/id?1009086
http://secunia.com/advisories/10706
XForce ISS Database: servu-sitechmod-command-dos(15251)
https://exchange.xforce.ibmcloud.com/vulnerabilities/15251
CopyrightCopyright (C) 2004 Astharot

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.