GlobalSCAPE Secure FTP Server User Input Overflow

critical Nessus Plugin ID 18627

Synopsis

The remote FTP server is affected by a buffer overflow vulnerability.

Description

The remote host is running GlobalSCAPE Secure FTP Server.

GlobalSCAPE Secure FTP Server 3.0.2 and prior versions are affected by a buffer overflow due to mishandling the user-supplied input.

An attacker would first need to authenticate to the server before they can execute arbitrary commands.

Solution

Upgrade to GlobalSCAPE Secure FTP 3.0.3 Build 4.29.2005 or later as this reportedly fixes the issue.

See Also

https://seclists.org/fulldisclosure/2005/May/12

http://www.globalscape.com/gsftps/history.aspx

Plugin Details

Severity: Critical

ID: 18627

File Name: globalscapeftp_user_input.nasl

Version: 1.21

Type: remote

Family: FTP

Published: 7/6/2005

Updated: 11/15/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.3

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:globalscape:secure_ftp_server

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 5/1/2005

Exploitable With

Core Impact

Metasploit (GlobalSCAPE Secure FTP Server Input Overflow)

Reference Information

CVE: CVE-2005-1415

BID: 13454