Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> FTP >> Solaris FTPd tells if a user exists


Vulnerability Assessment Details

Solaris FTPd tells if a user exists

Vulnerability Assessment Summary
CWD ~root before logging in

Detailed Explanation for this Vulnerability Assessment

It is possible to acertain the existence of a
user on the remote system by issuing the command
CWD ~, even before logging in.

Ie:
telnet target 21
CWD ~root
530 Please login with USER and PASS.

CWD ~nonexistinguser
530 Please login with USER and PASS.
550 Unknown user name after ~

A possible hacker may use this to acertain the existence of
known to be vulnerable accounts (like guest) or to
acertain which system you are running.

Solution : inform your vendor, and ask for a patch, or
change your FTP server

Network Security Threat Level: Low

Networks Security ID: 2564

Vulnerability Assessment Copyright: This script is Copyright (C) 2001 Renaud Deraison

Cables, Connectors

SanDisk SSD Plus 240GB SATA I Internal Solid State Hard Drive HDD No Reserve .01
$0.01
SanDisk SSD Plus 240GB SATA I Internal Solid State Hard Drive HDD No Reserve .01 pictureNew Crucial MX300 1TB SSD Solid State Drive 2.5" CT1050MX300SSD1 1050GB SATA 6.0
$26.66
New Crucial MX300 1TB SSD Solid State Drive 2.5Crucial MX300 1TB SSD Solid State Drive 2.5" CT1050MX300SSD1 1050GB SATA 6.0
$25.62
Crucial MX300 1TB SSD Solid State Drive 2.5New Crucial MX300 1TB SSD Solid State Drive 2.5"CT1050MX300SSD1 1050GB SATA 6.0
$25.62
New Crucial MX300 1TB SSD Solid State Drive 2.5


Discussions

No Discussions have been posted on this vulnerability.