发布时间 :2002-07-26 00:00:00
修订时间 :2017-12-18 21:29:37

[原文]Buffer overflow in Transsoft Broker FTP Server 5.0 evaluation allows remote attackers to cause a denial of service and possibly execute arbitrary code via a CWD command with a large number of . (dot) characters.

[CNNVD]TransSoft FTP-Broker远程拒绝服务攻击漏洞(CNNVD-200207-108)

        Transoft Broker FTP是一款Windows平台下的FTP服务器程序。
        Transoft Broker FTP存在漏洞,可导致远程攻击者进行拒绝服务攻击。
        攻击者可以提交包含多个'.'字符为参数的CWD命令给Transoft Broker FTP服务程序,可导致FTP服务器停止响应,产生拒绝服务攻击。

- CVSS (基础分值)

CVSS分值: 10 [严重(HIGH)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)


- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(VENDOR_ADVISORY)  BUGTRAQ  20020527 Problems with various windows FTP servers
(UNKNOWN)  BID  4864
(UNKNOWN)  XF  broker-ftp-dot-bo(6673)

- 漏洞信息

TransSoft FTP-Broker远程拒绝服务攻击漏洞
危急 其他
2002-07-26 00:00:00 2005-10-20 00:00:00
        Transoft Broker FTP是一款Windows平台下的FTP服务器程序。
        Transoft Broker FTP存在漏洞,可导致远程攻击者进行拒绝服务攻击。
        攻击者可以提交包含多个'.'字符为参数的CWD命令给Transoft Broker FTP服务程序,可导致FTP服务器停止响应,产生拒绝服务攻击。

- 公告与补丁


- 漏洞信息

Broker FTP Server CWD Dot Command Overflow
Input Manipulation
Loss of Integrity

- 漏洞描述

Unknown or Incomplete

- 时间线

2002-05-27 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

TransSoft FTP-Broker Denial of Service Vulnerability
Failure to Handle Exceptional Conditions 4864
Yes No
2002-05-27 12:00:00 2009-07-11 01:56:00
Discovered by SnakeByte / Eric Sesterhenn <>.

- 受影响的程序版本

TransSoft Broker FTP Server 5.0
- Microsoft Windows 2000 Professional
- Microsoft Windows 95
- Microsoft Windows 98
- Microsoft Windows NT 4.0

- 漏洞讨论

Transoft Broker is an FTP server for the Windows platform.

It is possible for FTP users to cause the host to stop responding. Reportedly, this is possible when submitting a CWD command along with numerous '....' character sequences.

- 漏洞利用

No exploit code is required.

- 解决方案

Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: <>.

- 相关参考