Serv-U <

High Nessus Plugin ID 42934


The remote FTP server is affected by multiple vulnerabilities.


According to its banner, the installed version of Serv-U is earlier than, and therefore affected by the following issues :

- A boundary error in the web administration interface when parsing session cookies can result in a stack-based buffer overflow. (CVE-2009-4873)

- A boundary error in the TEA decoding algorithm can result in a stack-based buffer overflow when processing a long hexadecimal string. (CVE-2009-4006)


Upgrade to Serv-U version or later.

See Also

Plugin Details

Severity: High

ID: 42934

File Name: servu_9_1_0_0.nasl

Version: $Revision: 1.13 $

Type: remote

Family: FTP

Published: 2009/11/30

Modified: 2017/11/06

Dependencies: 48434

Risk Information

Risk Factor: High


Base Score: 9

Temporal Score: 8.5

Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:U/RC:ND

Vulnerability Information

CPE: cpe:/a:serv-u:serv-u

Required KB Items: ftp/servu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2009/11/17

Vulnerability Publication Date: 2009/11/17

Exploitable With

Core Impact

Metasploit (Rhinosoft Serv-U Session Cookie Buffer Overflow)

Reference Information

CVE: CVE-2009-4006, CVE-2009-4873

BID: 36895, 37051

OSVDB: 59772, 60427

Secunia: 37228

CWE: 119