CuteFTP < 5.0.2.0 Multiple Vulnerabilities

This script is Copyright (C) 2003-2016 Tenable Network Security, Inc.


Synopsis :

The remote FTP client is affected by various issues.

Description :

CuteFTP, an FTP client, is installed on the remote Windows host.

The version of CuteFTP on the remote host reportedly is affected by a
buffer overflow that may be exploited by an attacker to execute
arbitrary commands, subject to the privileges of the current user. To
exploit this issue, an attacker would need to set up a rogue FTP
server and lure a user of this host to browse it using CuteFTP.

In addition, the client is also affected by a flaw in which a local
user can crash the client by copying a long URL into the clipboard.

See also :

http://seclists.org/bugtraq/2003/Jan/125
http://seclists.org/bugtraq/2003/Feb/89
http://seclists.org/bugtraq/2003/Jun/154

Solution :

Upgrade to CuteFTP 5.0.2.0 or later.

Risk factor :

High / CVSS Base Score : 7.6
(CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 6.3
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: Windows

Nessus Plugin ID: 11756 (cuteftp_flaws.nasl)

Bugtraq ID: 6642
6786

CVE ID: CVE-2003-1260
CVE-2003-1261

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now