NetTerm FTP Server USER Command Remote Overflow

high Nessus Network Monitor Plugin ID 2861

Synopsis

The remote host is vulnerable to a buffer overflow.

Description

The remote host is running NetTerm FTP Server. All versions of NetTerm FTP server are vulnerable to a remote buffer overflow. The primary maintainers have removed netftpd.exe from all new versions of their product. An attacker exploiting this flaw would be able to execute arbitrary code on the remote FTP server.

Solution

No solution is known at this time.

See Also

http://www.securenetterm.com/html/what_s_new.html

http://www.securityfocus.com/archive/1/396959

Plugin Details

Severity: High

ID: 2861

Family: FTP Servers

Published: 4/26/2005

Updated: 3/6/2019

Nessus ID: 18142

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 7.1

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS v3

Risk Factor: High

Base Score: 7.3

Temporal Score: 7.1

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS:3.0/E:F/RL:U/RC:X

Vulnerability Information

CPE: cpe:/a:intersoft:netterm

Exploitable With

Metasploit (NetTerm NetFTPD USER Buffer Overflow)

Reference Information

CVE: CVE-2005-1323

BID: 13396