How to Buy
This script is Copyright (C) 2014-2016 Tenable Network Security, Inc.
The FTP server running on the remote host is affected by multiple
The version of Core FTP running on the remote host is prior to 1.2
build 515. It is, therefore, affected by multiple vulnerabilities :
- A denial of service vulnerability exists that is
triggered when handling malformed data after the 'AUTH
SSL' command. An unauthenticated, remote attacker can
exploit this to cause an assertion failure, resulting in
a server crash. (CVE-2014-1441)
- A information disclosure vulnerability exists due to a
failure to properly sanitize user-supplied input. An
authenticated, remote attacker can exploit this, via
directory traversal using the 'XCRC' command, to gain
access to arbitrary files. (CVE-2014-1442)
- An information disclosure vulnerability exists due to
improper handling of crafted string data by the 'USER'
command. An authenticated, remote attacker can exploit
this, via a specially crafted string, to access the
password for the user that previously logged on.
See also :
Upgrade to Core FTP version 1.2 build 515 or later.
Risk factor :
Medium / CVSS Base Score : 5.0
CVSS Temporal Score : 4.3
Public Exploit Available : true
Nessus Plugin ID: 72662 ()
Bugtraq ID: 654286543065432
CVE ID: CVE-2014-1441CVE-2014-1442CVE-2014-1443
Nessus Professional: Scan unlimited IPs, run compliance checks & moreNessus Cloud: The power of Nessus for teams – from the cloud
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.