Serv-U <

high Nessus Plugin ID 42934


The remote FTP server is affected by multiple vulnerabilities.


According to its banner, the installed version of Serv-U is earlier than, and therefore affected by the following issues :

- A boundary error in the web administration interface when parsing session cookies can result in a stack-based buffer overflow. (CVE-2009-4873)

- A boundary error in the TEA decoding algorithm can result in a stack-based buffer overflow when processing a long hexadecimal string. (CVE-2009-4006)


Upgrade to Serv-U version or later.

See Also

Plugin Details

Severity: High

ID: 42934

File Name: servu_9_1_0_0.nasl

Version: 1.16

Type: remote

Family: FTP

Published: 11/30/2009

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information


Risk Factor: High

Score: 7.4


Risk Factor: High

Base Score: 9

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:serv-u:serv-u

Required KB Items: ftp/servu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 11/17/2009

Vulnerability Publication Date: 11/17/2009

Exploitable With

Core Impact

Metasploit (Rhinosoft Serv-U Session Cookie Buffer Overflow)

Reference Information

CVE: CVE-2009-4006, CVE-2009-4873

BID: 36895, 37051

CWE: 119

SECUNIA: 37228