How to Buy
This script is Copyright (C) 2008-2016 Tenable Network Security, Inc.
The remote FTP server is affected by several vulnerabilities.
The installed version of Serv-U 7.x is earlier than 220.127.116.11 and thus
is reportedly affected by the following issues :
- An authenticated, remote attacker can cause the service
to consume all CPU time on the remote host by
specifying a Windows port (eg, 'CON:') when using the
STOU command provided he has write access to a
- An authenticated, remote attacker can overwrite or create
arbitrary files via a directory traversal attack in the
- An authenticated, remote attacker may be able to upload a
file to the current Windows directory with rename by
placing the destination in '\' (ie, 'My Computer').
See also :
Upgrade to Serv-U version 18.104.22.168 or later.
Risk factor :
High / CVSS Base Score : 9.0
CVSS Temporal Score : 8.5
Public Exploit Available : true
Nessus Plugin ID: 34398 ()
Bugtraq ID: 3155631563
CVE ID: CVE-2008-4500CVE-2008-4501
Nessus Professional: Scan unlimited IPs, run compliance checks & moreNessus Cloud: The power of Nessus for teams – from the cloud
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.