Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | |||
Test ID: | 1.3.6.1.4.1.25623.1.0.801626 |
Category: | General |
Title: | Robo-FTP Directory Traversal Vulnerability |
Summary: | This host is installed with Robo-FTP and is prone to directory; traversal vulnerability. |
Description: | Summary: This host is installed with Robo-FTP and is prone to directory traversal vulnerability. Vulnerability Insight: This flaw is due to an input validation error when downloading directories containing files with directory traversal specifiers in the filename. This can be exploited to download files to an arbitrary location on a user's system. Vulnerability Impact: Successful exploitation will allow attacker to download or upload arbitrary files. This may aid in further attacks. Affected Software/OS: Robo-FTP versions prior to 3.7.5. Solution: Upgrade to Robo-FTP version 3.7.5 or later. CVSS Score: 9.3 CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C |
Cross-Ref: |
BugTraq ID: 44073 Common Vulnerability Exposure (CVE) ID: CVE-2010-4095 http://www.securityfocus.com/bid/44073 Bugtraq: 20101013 Directory Traversal Vulnerability in Robo-FTP (Google Search) http://www.securityfocus.com/archive/1/514267/100/0/threaded http://www.htbridge.ch/advisory/directory_traversal_vulnerability_in_robo_ftp.html http://secunia.com/advisories/41809 XForce ISS Database: roboftp-ftp-dir-traversal(62548) https://exchange.xforce.ibmcloud.com/vulnerabilities/62548 |
Copyright | Copyright (C) 2010 Greenbone Networks GmbH |
This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |