Core FTP < 2.2 build 1785 CWD Command Buffer Overflow

high Nessus Plugin ID 70656

Synopsis

An FTP client on the remote host is affected by a stack-based buffer overflow vulnerability.

Description

The version of Core FTP installed on the remote host is prior to 2.2 build 1785. It is, therefore, affected by a stack-based buffer overflow vulnerability because user-supplied input is not properly validated when handling directory names via the 'CWD' command. A remote attacker could potentially exploit this issue with specially crafted directory names, resulting in a denial of service or code execution subject to the user's privileges.

Solution

Upgrade to Core FTP 2.2 build 1785 or later.

See Also

http://coreftp.com/forums/viewtopic.php?t=222102

Plugin Details

Severity: High

ID: 70656

File Name: coreftp_2_2_1785.nasl

Version: 1.3

Type: local

Agent: windows

Family: Windows

Published: 10/28/2013

Updated: 7/6/2018

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 6.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:coreftp:coreftp

Required KB Items: SMB/CoreFTP/Installed

Exploit Ease: No known exploits are available

Patch Publication Date: 8/14/2013

Vulnerability Publication Date: 8/15/2013

Reference Information

CVE: CVE-2013-3930

BID: 61786