Cerberus FTP Server Command Processing DoS

Medium Nessus Plugin ID 40821


The FTP server installed on the remote Windows host has a denial of service vulnerability.


The version of Cerberus FTP server on the remote host has a denial of service vulnerability. Sending a very long argument (1400 bytes or more) to any command causes the server to crash. This reportedly does not result in memory corruption - the vulnerable versions abnormally terminate when a long argument is received (before any data is successfully copied into the destination buffer). A remote attacker could exploit this issue to cause a denial of service.


Upgrade to Cerberus FTP server 3.0.2 or later.

See Also



Plugin Details

Severity: Medium

ID: 40821

File Name: cerberus_ftp_3_0_2.nasl

Version: $Revision: 1.11 $

Type: local

Family: FTP

Published: 2009/08/31

Modified: 2017/04/27

Dependencies: 40820

Risk Information

Risk Factor: Medium


Base Score: 5

Temporal Score: 4.1

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:cerberusftp:ftp_server

Required KB Items: SMB/CerberusFTP/Installed

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2009/08/16

Vulnerability Publication Date: 2009/08/12

Reference Information

BID: 36134

OSVDB: 57398

EDB-ID: 9515

Secunia: 36456