Búsqueda de    
Vulnerabilidad   
    Buscar 219043 Descripciones CVE y
99761 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.901106
Categoría:FTP
Título:Trellian FTP 'PASV' Response Buffer Overflow Vulnerability
Resumen:This host is installed with Trellian FTP and is prone to buffer;overflow vulnerability.
Descripción:Summary:
This host is installed with Trellian FTP and is prone to buffer
overflow vulnerability.

Vulnerability Insight:
The flaw is due to improper bounds checking when processing
long FTP 'PASV' responses.

Vulnerability Impact:
Successful exploitation could allow remote attackers to execute
arbitrary code within the context of the affected application.

Affected Software/OS:
Trellian FTP version 3.1.3.1789 and prior.

Solution:
No known solution was made available for at least one year since the disclosure
of this vulnerability. Likely none will be provided anymore. General solution options are to upgrade to a newer
release, disable respective features, remove the product or replace the product by another one.

CVSS Score:
9.3

CVSS Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C

Referencia Cruzada: BugTraq ID: 39598
Common Vulnerability Exposure (CVE) ID: CVE-2010-1465
http://www.exploit-db.com/exploits/12152
http://secunia.com/advisories/39370
XForce ISS Database: trellian-pasv-bo(57778)
https://exchange.xforce.ibmcloud.com/vulnerabilities/57778
CopyrightCopyright (C) 2010 Greenbone Networks GmbH

Esta es sólo una de 99761 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2024 E-Soft Inc. Todos los derechos reservados.