Ability FTP Server Multiple Command Remote Buffer Overflows

critical Nessus Plugin ID 15628

Synopsis

The remote FTP server is vulnerable to multiple remote buffer overflow attacks.

Description

The remote host is running Ability FTP Server. It is reported that the remote version of this software is prone to a remote buffer overflow attack via the 'STOR' and 'APPE' commands. An attacker, exploiting this flaw, would only need to be able to craft and send a query to the FTP server on its service port (usually 21).

Solution

Upgrade to Ability FTP Server version 2.35 or newer.

See Also

https://seclists.org/bugtraq/2004/Oct/252

http://www.nessus.org/u?cbaf8896

Plugin Details

Severity: Critical

ID: 15628

File Name: ability_ftp_overflow.nasl

Version: 1.17

Type: remote

Family: FTP

Published: 11/4/2004

Updated: 11/15/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.0

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 10/22/2004

Exploitable With

Metasploit (Ability Server 2.34 STOR Command Stack Buffer Overflow)

Reference Information

CVE: CVE-2004-1626, CVE-2004-1627

BID: 11508

Secunia: 12941