ID CVE-2007-6738
Summary pyftpdlib before 0.1.1 does not choose a random value for the port associated with the PASV command, which makes it easier for remote attackers to obtain potentially sensitive information about the number of in-progress data connections by reading the response to this command.
References
Vulnerable Configurations
  • cpe:2.3:a:g.rodola:pyftpdlib:*:*:*:*:*:*:*:*
    cpe:2.3:a:g.rodola:pyftpdlib:*:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 20-10-2010 - 04:00)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL NONE NONE
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:N/A:N
refmap via4
confirm http://code.google.com/p/pyftpdlib/source/browse/trunk/HISTORY
Last major update 20-10-2010 - 04:00
Published 19-10-2010 - 20:00
Last modified 20-10-2010 - 04:00
Back to Top