Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Gain a shell remotely >> Easy File Sharing FTP Server PASS Command Buffer Overflow Vulnerability


Vulnerability Assessment Details

Easy File Sharing FTP Server PASS Command Buffer Overflow Vulnerability

Vulnerability Assessment Summary
Checks for PASS command buffer overflow vulnerability in EFS FTP Server

Detailed Explanation for this Vulnerability Assessment

Summary :

The remote FTP server is affected by a buffer overflow vulnerability.

Description :

The remote host appears to be using Easy File Sharing FTP Server, an
FTP server for Windows.

The version of Easy File Sharing FTP Server installed on the remote
host contains a stack-based buffer overflow vulnerability that can be
exploited by an unauthenticated attacker with a specially-crafted PASS
command to crash the affected application or execute arbitrary code on
the affected host.

See also :

http://www.milw0rm.com/exploits/2234

Solution :

Unknown at this time.

Network Security Threat Level:

High / CVSS Base Score : 7
(AV:R/AC:L/Au:NR/C:P/A:P/I:P/B:N)

Networks Security ID: 19243

Vulnerability Assessment Copyright: This script is Copyright (C) 2006 Tenable Network Security

Cables, Connectors

Micron 4GB (1-Stick) MT16KTF51264HZ-1G6M1 PC3-12800 DDR3 1600 Laptop Memory RAM
$11.99
Micron 4GB (1-Stick) MT16KTF51264HZ-1G6M1 PC3-12800 DDR3 1600 Laptop Memory RAM pictureKingston 4GB (1-Stick) PC3-1066 DDR3 1333 KTH9600B/4G Low-Profile PC Memory RAM
$16.99
Kingston 4GB (1-Stick) PC3-1066 DDR3 1333 KTH9600B/4G Low-Profile PC Memory RAM picture


Discussions

No Discussions have been posted on this vulnerability.