Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
146377 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.800307
Categoría:FTP
Título:AceFTP LIST Command Directory Traversal Vulnerability
Resumen:AceFTP is prone to a directory traversal vulnerability.
Descripción:Summary:
AceFTP is prone to a directory traversal vulnerability.

Vulnerability Insight:
The flaw is due to input validation errors when processing FTP
responses to a LIST command. These can be exploited by attackers when downloading the directories containing
files with directory traversal specifiers in the filename.

Vulnerability Impact:
Successful exploitation allows attackers to execute arbitrary code by
tricking a user into downloading a directory containing files with
specially crafted filenames from a malicious FTP server.

Affected Software/OS:
Visicom Medias AceFTP Freeware/Pro Version 3.80.3 and prior on Windows.

Solution:
No known solution was made available for at least one year since the disclosure
of this vulnerability. Likely none will be provided anymore. General solution options are to upgrade to a newer
release, disable respective features, remove the product or replace the product by another one.

CVSS Score:
9.3

CVSS Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2008-5175
BugTraq ID: 29989
http://www.securityfocus.com/bid/29989
http://vuln.sg/aceftp3803-en.html
http://secunia.com/advisories/30792
http://www.vupen.com/english/advisories/2008/1954/references
XForce ISS Database: aceftp-list-directory-traversal(43400)
https://exchange.xforce.ibmcloud.com/vulnerabilities/43400
CopyrightCopyright (C) 2008 Greenbone AG

Esta es sólo una de 146377 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.