DreamFTP Server username Remote Format String

This script is Copyright (C) 2004-2015 Tenable Network Security, Inc.

Synopsis :

Arbitrary code may be run on the remote host.

Description :

The remote DreamFTP server is vulnerable to a format string attack when
processing the USER command.

An attacker may exploit this flaw to gain a shell on this host.

Solution :

Upgrade to DreamFTP 1.03 or newer (when available) or use another FTP

Risk factor :

High / CVSS Base Score : 7.5
CVSS Temporal Score : 7.1
Public Exploit Available : true

Family: FTP

Nessus Plugin ID: 12086 (dreamftp_format_string.nasl)

Bugtraq ID: 9800

CVE ID: CVE-2004-2074

Ready to Scan Unlimited IPs & Run Compliance Checks?

Upgrade to Nessus Professional today!

Buy Now

Combine the Power of Nessus with the Ease of Cloud

Start your free Nessus Cloud trial now!

Begin Free Trial