DreamFTP Server username Remote Format String

This script is Copyright (C) 2004-2015 Tenable Network Security, Inc.

Synopsis :

Arbitrary code may be run on the remote host.

Description :

The remote DreamFTP server is vulnerable to a format string attack when
processing the USER command.

An attacker may exploit this flaw to gain a shell on this host.

Solution :

Upgrade to DreamFTP 1.03 or newer (when available) or use another FTP

Risk factor :

High / CVSS Base Score : 7.5
CVSS Temporal Score : 7.1
Public Exploit Available : true

Family: FTP

Nessus Plugin ID: 12086 (dreamftp_format_string.nasl)

Bugtraq ID: 9800

CVE ID: CVE-2004-2074

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now