SAMI FTP Server <= 2.0.2 Authentication Credentials Remote Overflow

medium Nessus Network Monitor Plugin ID 3535

Synopsis

The remote host is vulnerable to a buffer overflow.

Description

The remote host is running SAMI FTP server. It has been reported that this version of SAMI is vulnerable to a buffer overflow in the way that it handles USER and PASSWORD information. An attacker exploiting this flaw would be able to execute arbitrary code on the remote SAMI FTP server.

Solution

No solution is known at this time.

See Also

http://www.karja.com/samiftp/main.php

Plugin Details

Severity: Medium

ID: 3535

Family: FTP Servers

Published: 8/18/2004

Updated: 3/6/2019

Risk Information

VPR

Risk Factor: Medium

Score: 5.7

CVSS v2

Risk Factor: Medium

Base Score: 6.4

Temporal Score: 5.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N

CVSS v3

Risk Factor: Medium

Base Score: 6.5

Temporal Score: 6

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N

Temporal Vector: CVSS:3.0/E:U/RL:U/RC:X

Vulnerability Information

CPE: cpe:/a:karjasoft:sami_ftp_server

Exploitable With

Core Impact

Metasploit (KarjaSoft Sami FTP Server v2.02 USER Overflow)

Reference Information

CVE: CVE-2006-2212

BID: 17835