var-200605-0499
Vulnerability from variot
Buffer overflow in XM Easy Personal FTP Server 4.2 and 5.0.1 allows remote authenticated users to cause a denial of service via a long argument to the PORT command. A buffer may be overrun with attacker-supplied data. Exploiting this issue allows remote attackers to execute arbitrary machine code in the context of the ftp server application. Failed exploit attempts will likely crash applications, denying service to legitimate users.
Secunia Survey
Secunia would like to invite you to participate in an electronic survey evolving the usefulness of our mailing lists. To value your effort Secunia will offer you free access to the Secunia Security Manager for three months as well as have a prize draw for an iPod nano.
We hope that you will give us a few minutes of your time, as your response will help us provide you with better services in the future. The questionnaire contains 19 questions and it takes approximately 5 minutes to answer the questionnaire.
https://ca.secunia.com/survey/?survey_url=kei933wBid2
The survey is being conducted in accordance with the general Secunia Security Policy and your answers will of course be kept strictly confidential.
The vulnerability is caused due to a boundary error within the handling of the USER command. This can be exploited to cause a heap-based buffer overflow via overly long arguments passed to the command.
The vulnerability has been confirmed in version 4.3. Prior versions may also be affected.
SOLUTION: Filter malicious requests in a proxy or firewall with FTP filtering capabilities.
PROVIDED AND/OR DISCOVERED BY: Muhammad Ahmed Siddiqui
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200605-0499", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "xm easy personal ftp server", "scope": "eq", "trust": 1.6, "vendor": "dxmsoft", "version": "5.0.1" }, { "model": "xm easy personal ftp server", "scope": "eq", "trust": 1.6, "vendor": "dxmsoft", "version": "4.2" }, { "model": "xm easy personal ftp server", "scope": "eq", "trust": 0.8, "vendor": "dxmsoft", "version": "4.2 and 5.0.1" }, { "model": "easy personal ftp server dxmsoft", "scope": "eq", "trust": 0.6, "vendor": "xm", "version": "5.0.1" }, { "model": "easy personal ftp server dxmsoft", "scope": "eq", "trust": 0.6, "vendor": "xm", "version": "4.2" }, { "model": "easy personal ftp server", "scope": "eq", "trust": 0.3, "vendor": "xm", "version": "5.0.1" }, { "model": "easy personal ftp server", "scope": "eq", "trust": 0.3, "vendor": "xm", "version": "5.2.1" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2006-2919" }, { "db": "BID", "id": "18711" }, { "db": "JVNDB", "id": "JVNDB-2006-003980" }, { "db": "CNNVD", "id": "CNNVD-200605-096" }, { "db": "NVD", "id": "CVE-2006-2226" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:dxmsoft:xm_easy_personal_ftp_server", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2006-003980" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Jerome Athias is credited with the discovery of this vulnerability.", "sources": [ { "db": "BID", "id": "18711" }, { "db": "CNNVD", "id": "CNNVD-200605-096" } ], "trust": 0.9 }, "cve": "CVE-2006-2226", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2006-2226", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2006-2919", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2006-2226", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2006-2226", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2006-2919", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-200605-096", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2006-2919" }, { "db": "JVNDB", "id": "JVNDB-2006-003980" }, { "db": "CNNVD", "id": "CNNVD-200605-096" }, { "db": "NVD", "id": "CVE-2006-2226" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Buffer overflow in XM Easy Personal FTP Server 4.2 and 5.0.1 allows remote authenticated users to cause a denial of service via a long argument to the PORT command. A buffer may be overrun with attacker-supplied data. \nExploiting this issue allows remote attackers to execute arbitrary machine code in the context of the ftp server application. Failed exploit attempts will likely crash applications, denying service to legitimate users. \n\n----------------------------------------------------------------------\n\nSecunia Survey\n\nSecunia would like to invite you to participate in an electronic survey\nevolving the usefulness of our mailing lists. To value your effort\nSecunia will offer you free access to the Secunia Security Manager for\nthree months as well as have a prize draw for an iPod nano. \n\nWe hope that you will give us a few minutes of your time, as your\nresponse will help us provide you with better services in the future. \nThe questionnaire contains 19 questions and it takes approximately 5\nminutes to answer the questionnaire. \n\nhttps://ca.secunia.com/survey/?survey_url=kei933wBid2\n\nThe survey is being conducted in accordance with the general Secunia\nSecurity Policy and your answers will of course be kept strictly\nconfidential. \n\nThe vulnerability is caused due to a boundary error within the\nhandling of the USER command. This can be exploited to cause a\nheap-based buffer overflow via overly long arguments passed to the\ncommand. \n\nThe vulnerability has been confirmed in version 4.3. Prior versions\nmay also be affected. \n\nSOLUTION:\nFilter malicious requests in a proxy or firewall with FTP filtering\ncapabilities. \n\nPROVIDED AND/OR DISCOVERED BY:\nMuhammad Ahmed Siddiqui\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2006-2226" }, { "db": "JVNDB", "id": "JVNDB-2006-003980" }, { "db": "CNVD", "id": "CNVD-2006-2919" }, { "db": "BID", "id": "18711" }, { "db": "PACKETSTORM", "id": "46042" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2006-2226", "trust": 3.3 }, { "db": "BID", "id": "18711", "trust": 2.5 }, { "db": "SECUNIA", "id": "19970", "trust": 1.7 }, { "db": "EXPLOIT-DB", "id": "1552", "trust": 1.6 }, { "db": "JVNDB", "id": "JVNDB-2006-003980", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2006-2919", "trust": 0.6 }, { "db": "MILW0RM", "id": "1552", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-200605-096", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "46042", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2006-2919" }, { "db": "BID", "id": "18711" }, { "db": "JVNDB", "id": "JVNDB-2006-003980" }, { "db": "PACKETSTORM", "id": "46042" }, { "db": "CNNVD", "id": "CNNVD-200605-096" }, { "db": "NVD", "id": "CVE-2006-2226" } ] }, "id": "VAR-200605-0499", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2006-2919" } ], "trust": 1.6 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2006-2919" } ] }, "last_update_date": "2024-11-23T21:49:35.283000Z", "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2006-2226" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.2, "url": "http://www.securityfocus.com/bid/18711" }, { "trust": 1.9, "url": "http://www.packetstormsecurity.org/0606-exploits/xmepftp.txt" }, { "trust": 1.6, "url": "http://secunia.com/advisories/19970" }, { "trust": 1.0, "url": "https://www.exploit-db.com/exploits/1552" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-2226" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2006-2226" }, { "trust": 0.6, "url": "http://www.milw0rm.com/exploits/1552" }, { "trust": 0.6, "url": "http://milw0rm.com/exploits/1552" }, { "trust": 0.3, "url": "http://www.dxm2008.com/" }, { "trust": 0.1, "url": "http://secunia.com/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/19970/" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "http://secunia.com/product/9760/" }, { "trust": 0.1, "url": "http://secunia.com/about_secunia_advisories/" }, { "trust": 0.1, "url": "https://ca.secunia.com/survey/?survey_url=kei933wbid2" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2006-2919" }, { "db": "BID", "id": "18711" }, { "db": "JVNDB", "id": "JVNDB-2006-003980" }, { "db": "PACKETSTORM", "id": "46042" }, { "db": "CNNVD", "id": "CNNVD-200605-096" }, { "db": "NVD", "id": "CVE-2006-2226" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2006-2919" }, { "db": "BID", "id": "18711" }, { "db": "JVNDB", "id": "JVNDB-2006-003980" }, { "db": "PACKETSTORM", "id": "46042" }, { "db": "CNNVD", "id": "CNNVD-200605-096" }, { "db": "NVD", "id": "CVE-2006-2226" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2006-05-05T00:00:00", "db": "CNVD", "id": "CNVD-2006-2919" }, { "date": "2006-06-28T00:00:00", "db": "BID", "id": "18711" }, { "date": "2014-03-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2006-003980" }, { "date": "2006-05-05T09:54:58", "db": "PACKETSTORM", "id": "46042" }, { "date": "2006-05-05T00:00:00", "db": "CNNVD", "id": "CNNVD-200605-096" }, { "date": "2006-05-05T19:02:00", "db": "NVD", "id": "CVE-2006-2226" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2006-05-05T00:00:00", "db": "CNVD", "id": "CNVD-2006-2919" }, { "date": "2016-07-06T14:40:00", "db": "BID", "id": "18711" }, { "date": "2014-03-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2006-003980" }, { "date": "2006-11-13T00:00:00", "db": "CNNVD", "id": "CNNVD-200605-096" }, { "date": "2024-11-21T00:10:50.120000", "db": "NVD", "id": "CVE-2006-2226" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-200605-096" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "XM Easy Personal FTP Server Buffer Overflow Vulnerability", "sources": [ { "db": "CNVD", "id": "CNVD-2006-2919" }, { "db": "CNNVD", "id": "CNNVD-200605-096" } ], "trust": 1.2 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer overflow", "sources": [ { "db": "CNNVD", "id": "CNNVD-200605-096" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.