FileZilla FTP Server MLSD Command Overflow

This script is Copyright (C) 2006-2017 Tenable Network Security, Inc.


Synopsis :

The remote Windows host has an application that is suffers from a
buffer overflow vulnerability.

Description :

According to its version, the FileZilla Server Interface installed on
the remote host is affected by an unspecified buffer overflow
vulnerability, which could be leveraged by an attacker to execute
arbitrary code subject to the privileges of the user running the
affected application.

Note that to successfully exploit this remotely, the application would
need to be configured to accept remote connections, which it does not
by default.

See also :

http://www.securityfocus.com/archive/1/433251/30/0/threaded
http://sourceforge.net/forum/forum.php?forum_id=569148

Solution :

Upgrade to FileZilla Server version 0.9.17 or later.

Risk factor :

Medium / CVSS Base Score : 6.4
(CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:P)
CVSS Temporal Score : 5.0
(CVSS2#E:POC/RL:OF/RC:ND)
Public Exploit Available : true

Family: Windows

Nessus Plugin ID: 21567 (filezilla_server_interface_buffer_overflow.nasl)

Bugtraq ID: 17802

CVE ID: CVE-2006-2173

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now