Provided by Aanval (Snort & Syslog Intrusion Detection and Correlation Engine) www.aanval.com
--
GEN:SID | 1:2374 |
Message | FTP NLST overflow attempt |
Summary | This event is generated when an attempt is made to exploit a buffer overflow vulnerability associated with Mollensoft Hyperion FTP/Encladus Server Suite NLST command. |
Impact | Remote access. A successful attack may permit the remote execution of arbitrary commands with system privileges. |
Detailed Information | CesarFTPD offers FTP servers for Windows hosts. A vulnerability exists with the NLST command that can cause a buffer overflow and permit the execution of arbitrary commands with system privileges. The buffer overflow can be caused by supplying an overly long argument to the NLST command. |
Affected Systems | Mollensoft Software Enceladus Server Suite 3.9.11 Mollensoft Software Hyperion FTP Server 3.5.2 |
Attack Scenarios | An attacker can supply an overly long file argument with the NLST command, causing a buffer overflow. |
Ease of Attack | Simple. |
Corrective Action | Upgrade to the latest non-affected version of the software. |
Additional References | |
Rule References | bugtraq: 10184 bugtraq: 7909 bugtraq: 9675 cve: 1999-1544 |
--
DID:328081
--
http://www.aanval.com/