Serv-U < 9.1.0.0

high Nessus Plugin ID 42934

Synopsis

The remote FTP server is affected by multiple vulnerabilities.

Description

According to its banner, the installed version of Serv-U is earlier than 9.1.0.0, and therefore affected by the following issues :

- A boundary error in the web administration interface when parsing session cookies can result in a stack-based buffer overflow. (CVE-2009-4873)

- A boundary error in the TEA decoding algorithm can result in a stack-based buffer overflow when processing a long hexadecimal string. (CVE-2009-4006)

Solution

Upgrade to Serv-U version 9.1.0.0 or later.

See Also

http://www.rangos.de/ServU-ADV.txt

https://secuniaresearch.flexerasoftware.com/secunia_research/2009-46/

https://support.solarwinds.com/Success_Center/Serv-U_Managed_File_Transfer_Serv-U_FTP_Server/Serv-U_Documentation/release_notes

Plugin Details

Severity: High

ID: 42934

File Name: servu_9_1_0_0.nasl

Version: 1.16

Type: remote

Family: FTP

Published: 11/30/2009

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: High

Base Score: 9

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:serv-u:serv-u

Required KB Items: ftp/servu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 11/17/2009

Vulnerability Publication Date: 11/17/2009

Exploitable With

Core Impact

Metasploit (Rhinosoft Serv-U Session Cookie Buffer Overflow)

Reference Information

CVE: CVE-2009-4006, CVE-2009-4873

BID: 36895, 37051

CWE: 119

SECUNIA: 37228