Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> FTP >> HP-UX FTPD REST Command Memory Disclosure Vulnerability


Vulnerability Assessment Details

HP-UX FTPD REST Command Memory Disclosure Vulnerability

Vulnerability Assessment Summary
Checks if the remote ftp sanitizes the RETR command

Detailed Explanation for this Vulnerability Assessment

Summary :

It is possible to disclose the contents of the memory of the remote host

Description :
The remote FTP server seems to be vulnerable to an integer conversion bug when
it receives a malformed argument to the 'REST' command.

A possible hacker may exploit this flaw to force the remote FTP daemon to disclose portions
of the memory of the remote host.

Solution :

If the remote FTP server is HP/UX ftpd, then apply patch PHNE_21936.

Network Security Threat Level:

Low / CVSS Base Score : 2
(AV:R/AC:H/Au:R/C:P/A:N/I:N/B:C)

Networks Security ID: 7825

Vulnerability Assessment Copyright: This script is Copyright (C) 2003 Tenable Network Security

Cables, Connectors

Apple IIGS keyboard model A9M0330 Vintage Mac
$49.99
Apple IIGS keyboard model A9M0330 Vintage Mac  pictureVintage Apple Computer Keyboard M0116 Macintosh Mac IIGS SE Made in U.S.A.
$79.99
Vintage Apple Computer Keyboard M0116 Macintosh Mac IIGS SE Made in U.S.A. pictureVintage Apple iBook Computer MyFamily M2453 Blue Clam Shell Mac
$75.0
Vintage Apple iBook Computer MyFamily M2453 Blue Clam Shell Mac pictureTwelve South BookBook for MacBook | Vintage leather book case for 13-inch Mac...
$107.92
Twelve South BookBook for MacBook | Vintage leather book case for 13-inch Mac... picture


Discussions

No Discussions have been posted on this vulnerability.