Provided by Aanval (Snort & Syslog Intrusion Detection and Correlation Engine) www.aanval.com
--
GEN:SID | 1:2340 |
Message | FTP SITE CHMOD overflow attempt |
Summary | This event is generated when an attempt is made to exploit a buffer overflow vulnerability associated with RhinoSoft Serv-u FTP Server CHMOD command. |
Impact | Remote access. A successful attack may permit the remote execution of arbitrary commands with system privileges. |
Detailed Information | Serv-u offers FTP servers for Windows hosts. A vulnerability exists with the CHMOD command that can cause a buffer overflow and permit the execution of arbitrary commands with system privileges. The buffer overflow can be caused by supplying an overly long argument to the CHMOD command. |
Affected Systems | RhinoSoft Serv-u FTP Server prior to version 4.2 |
Attack Scenarios | An attacker can supply an overly long file argument with the CHMOD command, causing a buffer overflow. |
Ease of Attack | Simple. |
Corrective Action | Upgrade to the latest non-affected version of the software. |
Additional References | |
Rule References | bugtraq: 10181 bugtraq: 9483 bugtraq: 9675 cve: 1999-0838 nessus: 12037 |
--
DID:414268
--
http://www.aanval.com/