Serv-U 7.x < Multiple Remote Vulnerabilities (DoS, Traversal)

high Nessus Plugin ID 34398
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.


The remote FTP server is affected by several vulnerabilities.


The installed version of Serv-U 7.x is earlier than and thus is reportedly affected by the following issues :

- An authenticated, remote attacker can cause the service to consume all CPU time on the remote host by specifying a Windows port (eg, 'CON:') when using the STOU command provided he has write access to a directory.

- An authenticated, remote attacker can overwrite or create arbitrary files via a directory traversal attack in the RNTO command.

- An authenticated, remote attacker may be able to upload a file to the current Windows directory with rename by placing the destination in '\' (ie, 'My Computer').


Upgrade to Serv-U version or later.

See Also

Plugin Details

Severity: High

ID: 34398

File Name: servu_7_3_0_1.nasl

Version: 1.20

Type: remote

Family: FTP

Published: 10/14/2008

Updated: 11/15/2018

Dependencies: servu_version.nasl

Risk Information


Risk Factor: Medium

Score: 6.7


Risk Factor: High

Base Score: 9

Temporal Score: 7

Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C

Temporal Vector: E:POC/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:serv-u:serv-u

Required KB Items: ftp/servu

Exploit Available: true

Exploit Ease: Exploits are available

Reference Information

CVE: CVE-2008-4500, CVE-2008-4501

BID: 31556, 31563

EDB-ID: 6660, 6661

Secunia: 32150

CWE: 20, 22