Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
146377 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.100354
Categoría:FTP
Título:RhinoSoft Serv-U FTP Server TEA Decoder Remote Stack Buffer Overflow Vulnerability
Resumen:RhinoSoft Serv-U FTP Server is prone to a remote stack-based buffer-; overflow vulnerability because the application fails to perform adequate boundary checks on user-supplied data.
Descripción:Summary:
RhinoSoft Serv-U FTP Server is prone to a remote stack-based buffer-
overflow vulnerability because the application fails to perform adequate boundary checks on user-supplied data.

Vulnerability Impact:
Attackers can exploit this issue to execute arbitrary code within the
context of the affected application. Failed exploit attempts will result in a denial-of-service condition.

Affected Software/OS:
Serv-U 9.0.0.5 is vulnerable. Other versions may also be affected.

Solution:
Updates are available. Please see the references for details.

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2009-4006
BugTraq ID: 37051
http://www.securityfocus.com/bid/37051
Bugtraq: 20091118 Secunia Research: RhinoSoft Serv-U TEA Decoding Buffer Overflow (Google Search)
http://www.securityfocus.com/archive/1/507955/100/0/threaded
http://secunia.com/secunia_research/2009-46/
http://www.serv-u.com/releasenotes/
http://www.osvdb.org/60427
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6142
http://www.securitytracker.com/id?1023199
http://secunia.com/advisories/37228
http://www.vupen.com/english/advisories/2009/3277
XForce ISS Database: servu-tea-bo(54322)
https://exchange.xforce.ibmcloud.com/vulnerabilities/54322
CopyrightCopyright (C) 2009 Greenbone AG

Esta es sólo una de 146377 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.