Inframail FTP Server NLST Command Remote Overflow

high Nessus Plugin ID 18587

Synopsis

The remote FTP server is vulnerable to a buffer overflow attack.

Description

The remote host is running the FTP server component of Inframail, a commercial suite of network servers from Infradig Systems.

According to its banner, the installed version of Inframail suffers from a buffer overflow vulnerability that arises when the FTP server component processes an NLST command with an excessively long argument (around 102400 bytes). Successful exploitation will cause the service to crash and may allow arbitrary code execution.

Solution

Upgrade to Inframail 7.12 or later.

See Also

http://reedarvin.thearvins.com/20050627-01.html

https://seclists.org/fulldisclosure/2005/Jun/347

Plugin Details

Severity: High

ID: 18587

File Name: inframail_as_ftp_overflow.nasl

Version: 1.16

Type: remote

Family: FTP

Published: 6/29/2005

Updated: 11/15/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: High

Base Score: 9

Temporal Score: 7

Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C

Vulnerability Information

Excluded KB Items: ftp/ncftpd, ftp/msftpd, ftp/fw1ftpd, ftp/vxftpd

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 6/27/2005

Reference Information

CVE: CVE-2005-2085

BID: 14077