Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> FTP >> Solaris FTPd tells if a user exists


Vulnerability Assessment Details

Solaris FTPd tells if a user exists

Vulnerability Assessment Summary
CWD ~root before logging in

Detailed Explanation for this Vulnerability Assessment

It is possible to acertain the existence of a
user on the remote system by issuing the command
CWD ~, even before logging in.

Ie:
telnet target 21
CWD ~root
530 Please login with USER and PASS.

CWD ~nonexistinguser
530 Please login with USER and PASS.
550 Unknown user name after ~

A possible hacker may use this to acertain the existence of
known to be vulnerable accounts (like guest) or to
acertain which system you are running.

Solution : inform your vendor, and ask for a patch, or
change your FTP server

Network Security Threat Level: Low

Networks Security ID: 2564

Vulnerability Assessment Copyright: This script is Copyright (C) 2001 Renaud Deraison

Cables, Connectors

Knoppix 7.2.0 Live Linux Bootable Startup CD (Runs form CD) +Free Retro Linux CD
$11.95
Knoppix 7.2.0 Live Linux Bootable Startup CD (Runs form CD) +Free Retro Linux CD pictureJim Stone Conspiracy Files 4 - Knoppix 8.1 live copy 20
$30.0
Jim Stone Conspiracy Files 4 - Knoppix 8.1 live copy 20 pictureKnoppix 8.1 live DVD with SD (Ignore the ebay message for local pick up)
$50.0
Knoppix 8.1 live DVD with SD (Ignore the ebay message for local pick up) pictureLatest KNOPPIX LINUX Operating system PC repair Bootable live system Windows DVD
$11.69
Latest KNOPPIX LINUX Operating system PC repair Bootable live system Windows DVD picture


Discussions

No Discussions have been posted on this vulnerability.