Lucene search

K
nessusThis script is Copyright (C) 2002-2011 Digital Defense, Inc.DDI_WS_FTP-SERVER-CPWD-BO.NASL
HistoryAug 21, 2002 - 12:00 a.m.

WS_FTP Server SITE CPWD Command Remote Overflow

2002-08-2100:00:00
This script is Copyright (C) 2002-2011 Digital Defense, Inc.
www.tenable.com
12

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.067 Low

EPSS

Percentile

93.8%

This host is running a version of WS_FTP FTP server prior to 3.1.2. Versions earlier than 3.1.2 contain an unchecked buffer in routines that handle the ‘CPWD’ command arguments. The ‘CPWD’ command allows remote users to change their password. By issuing a malformed argument to the CPWD command, a user could overflow a buffer and execute arbitrary code on this host. Note that a local user account is required.

#
# Copyright by Digital Defense, Inc. 
# Author: Forrest Rae <[email protected]>
#
# Script audit and contributions from Carmichael Security
#      Erik Anderson <[email protected]> (nb: domain no longer exists)
#      Added BugtraqID and CVE
#
# See the Nessus Scripts License for details
#
# Reference: www.atstake.com/research/advisories/2002/a080802-1.txt
# 

include("compat.inc");

if(description)
{
	script_id(11098);
	script_version ("1.20");

	script_cve_id("CVE-2002-0826");
	script_bugtraq_id(5427);

	script_name(english:"WS_FTP Server SITE CPWD Command Remote Overflow");
	script_summary(english:"Checks FTP server banner for vulnerable version of WS_FTP Server");

	script_set_attribute(attribute:"synopsis", value:
"Arbitrary code can be run on the remote FTP server." );
	script_set_attribute(attribute:"description", value:
"This host is running a version of WS_FTP FTP server prior to 3.1.2. 
Versions earlier than 3.1.2 contain an unchecked buffer in routines
that handle the 'CPWD' command arguments.  The 'CPWD' command allows
remote users to change their password.  By issuing a malformed
argument to the CPWD command, a user could overflow a buffer and
execute arbitrary code on this host.  Note that a local user account
is required." );
	script_set_attribute(attribute:"solution", value:
"The vendor has released a patch that fixes this issue.  Please
install the latest patch available from the vendor's website at
http://www.ipswitch.com/support/." );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
 script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"false");
	script_set_attribute(attribute:"plugin_publication_date", value:
"2002/08/21");
 script_set_attribute(attribute:"vuln_publication_date", value: "2002/08/08");
 script_cvs_date("Date: 2018/06/27 18:42:25");
	script_set_attribute(attribute:"plugin_type", value:"remote");
	script_end_attributes();

	script_category(ACT_GATHER_INFO); 
	script_family(english:"FTP");
	script_copyright(english:"This script is Copyright (C) 2002-2011 Digital Defense, Inc.");
	script_dependencie("ftpserver_detect_type_nd_version.nasl");
	script_require_ports("Services/ftp", 21);
	exit(0);
}

#
# The script code starts here : 
#
include("global_settings.inc");
include("ftp_func.inc");

port = get_ftp_port(default: 21);

banner = get_ftp_banner(port: port);

if(banner)
{
	if(egrep(pattern:".*WS_FTP Server (((1|2)\..*)|(3\.((0(\..*){0,1})|(1\.1))))", string:banner))
	    		security_hole(port:port);		
}

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.067 Low

EPSS

Percentile

93.8%

Related for DDI_WS_FTP-SERVER-CPWD-BO.NASL