var-200810-0276
Vulnerability from variot
Serv-U 7.0.0.1 through 7.3, including 7.2.0.1, allows remote authenticated users to cause a denial of service (CPU consumption) via a crafted stou command, probably related to MS-DOS device names, as demonstrated using "con:1". Serv-U FTP server is prone to a denial of service vulnerability. An attacker can exploit this vulnerability to cause the server to crash, effectively denying service to legitimate users. Serv-U FTP server 7.2.0.1 is vulnerable; other versions may also be affected. ----------------------------------------------------------------------
Do you need accurate and reliable IDS / IPS / AV detection rules?
Get in-depth vulnerability details: http://secunia.com/binary_analysis/sample_analysis/
TITLE: Serv-U File Renaming Directory Traversal and STOU Denial of Service
SECUNIA ADVISORY ID: SA32150
VERIFY ADVISORY: http://secunia.com/advisories/32150/
CRITICAL: Moderately critical
IMPACT: DoS, System access
WHERE:
From remote
SOFTWARE: Serv-U File Server 7.x http://secunia.com/advisories/product/19573/
DESCRIPTION: dmnt has discovered two vulnerabilities in Serv-U, which can be exploited by malicious users to cause a DoS (Denial of Service) or compromise a vulnerable system.
1) An error in the handling of the "STOU" FTP command can be exploited to exhaust available CPU resources via a specially crafted argument (e.g. "CON:1").
2) An input validation error in the FTP service when renaming files can be exploited to overwrite or create arbitrary files with user-supplied content via directory traversal attacks.
The vulnerabilities are confirmed in version 7.3.0.0.
PROVIDED AND/OR DISCOVERED BY: dmnt
ORIGINAL ADVISORY: http://milw0rm.com/exploits/6660 http://milw0rm.com/exploits/6661
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200810-0276", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "serv-u file server", "scope": "eq", "trust": 1.0, "vendor": "solarwinds", "version": "7.3.0.0" }, { "model": "serv-u file server", "scope": "eq", "trust": 1.0, "vendor": "solarwinds", "version": "7.2.0.0" }, { "model": "serv-u file server", "scope": "eq", "trust": 1.0, "vendor": "solarwinds", "version": "7.1.0.0" }, { "model": "serv-u file server", "scope": "eq", "trust": 1.0, "vendor": "solarwinds", "version": "7.1.0.2" }, { "model": "serv-u file server", "scope": "eq", "trust": 1.0, "vendor": "solarwinds", "version": "7.0.0.3" }, { "model": "serv-u file server", "scope": "eq", "trust": 1.0, "vendor": "solarwinds", "version": "7.0.0.4" }, { "model": "serv-u file server", "scope": "eq", "trust": 1.0, "vendor": "solarwinds", "version": "7.1.0.1" }, { "model": "serv-u file server", "scope": "eq", "trust": 1.0, "vendor": "solarwinds", "version": "7.0.0.1" }, { "model": "serv-u file server", "scope": "eq", "trust": 1.0, "vendor": "solarwinds", "version": "7.0.0.2" }, { "model": "serv-u file server", "scope": "eq", "trust": 1.0, "vendor": "solarwinds", "version": "7.3.0.1" }, { "model": "serv-u file server", "scope": "eq", "trust": 1.0, "vendor": "solarwinds", "version": "7.2.0.1" }, { "model": "serv-u file server", "scope": "eq", "trust": 1.0, "vendor": "solarwinds", "version": "7.3.0.2" }, { "model": "serv-u ftp server", "scope": "eq", "trust": 0.8, "vendor": "rhino", "version": "7.0.0.1 to 7.2.0.1 including 7.3" }, { "model": "serv-u", "scope": "eq", "trust": 0.6, "vendor": "serv u", "version": "7.2.0.0" }, { "model": "serv-u", "scope": "eq", "trust": 0.6, "vendor": "serv u", "version": "7.1.0.0" }, { "model": "serv-u", "scope": "eq", "trust": 0.6, "vendor": "serv u", "version": "7.2.0.1" }, { "model": "serv-u", "scope": "eq", "trust": 0.6, "vendor": "serv u", "version": "7.0.0.2" }, { "model": "serv-u", "scope": "eq", "trust": 0.6, "vendor": "serv u", "version": "7.0.0.3" }, { "model": "serv-u", "scope": "eq", "trust": 0.6, "vendor": "serv u", "version": "7.0.0.4" }, { "model": "serv-u", "scope": "eq", "trust": 0.6, "vendor": "serv u", "version": "7.3.0.0" }, { "model": "serv-u", "scope": "eq", "trust": 0.6, "vendor": "serv u", "version": "7.3.0.1" }, { "model": "serv-u", "scope": "eq", "trust": 0.6, "vendor": "serv u", "version": "7.3.0.2" }, { "model": "serv-u", "scope": "eq", "trust": 0.6, "vendor": "serv u", "version": "7.0.0.1" }, { "model": "software serv-u", "scope": "eq", "trust": 0.3, "vendor": "rhino", "version": "7.2.0.1" } ], "sources": [ { "db": "BID", "id": "31556" }, { "db": "JVNDB", "id": "JVNDB-2008-006295" }, { "db": "CNNVD", "id": "CNNVD-200810-126" }, { "db": "NVD", "id": "CVE-2008-4500" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:serv-u:serv-u", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2008-006295" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "dmnt", "sources": [ { "db": "BID", "id": "31556" }, { "db": "CNNVD", "id": "CNNVD-200810-126" } ], "trust": 0.9 }, "cve": "CVE-2008-4500", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "exploitabilityScore": 8.0, "id": "CVE-2008-4500", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2008-4500", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2008-4500", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-200810-126", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2008-006295" }, { "db": "CNNVD", "id": "CNNVD-200810-126" }, { "db": "NVD", "id": "CVE-2008-4500" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Serv-U 7.0.0.1 through 7.3, including 7.2.0.1, allows remote authenticated users to cause a denial of service (CPU consumption) via a crafted stou command, probably related to MS-DOS device names, as demonstrated using \"con:1\". Serv-U FTP server is prone to a denial of service vulnerability. \nAn attacker can exploit this vulnerability to cause the server to crash, effectively denying service to legitimate users. \nServ-U FTP server 7.2.0.1 is vulnerable; other versions may also be affected. ----------------------------------------------------------------------\n\nDo you need accurate and reliable IDS / IPS / AV detection rules?\n\nGet in-depth vulnerability details:\nhttp://secunia.com/binary_analysis/sample_analysis/\n\n----------------------------------------------------------------------\n\nTITLE:\nServ-U File Renaming Directory Traversal and STOU Denial of Service\n\nSECUNIA ADVISORY ID:\nSA32150\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/32150/\n\nCRITICAL:\nModerately critical\n\nIMPACT:\nDoS, System access\n\nWHERE:\n\u003eFrom remote\n\nSOFTWARE:\nServ-U File Server 7.x\nhttp://secunia.com/advisories/product/19573/\n\nDESCRIPTION:\ndmnt has discovered two vulnerabilities in Serv-U, which can be\nexploited by malicious users to cause a DoS (Denial of Service) or\ncompromise a vulnerable system. \n\n1) An error in the handling of the \"STOU\" FTP command can be\nexploited to exhaust available CPU resources via a specially crafted\nargument (e.g. \"CON:1\"). \n\n2) An input validation error in the FTP service when renaming files\ncan be exploited to overwrite or create arbitrary files with\nuser-supplied content via directory traversal attacks. \n\nThe vulnerabilities are confirmed in version 7.3.0.0. \n\nPROVIDED AND/OR DISCOVERED BY:\ndmnt\n\nORIGINAL ADVISORY:\nhttp://milw0rm.com/exploits/6660\nhttp://milw0rm.com/exploits/6661\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2008-4500" }, { "db": "JVNDB", "id": "JVNDB-2008-006295" }, { "db": "BID", "id": "31556" }, { "db": "PACKETSTORM", "id": "70630" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2008-4500", "trust": 2.7 }, { "db": "BID", "id": "31556", "trust": 1.9 }, { "db": "SECUNIA", "id": "32150", "trust": 1.8 }, { "db": "EXPLOIT-DB", "id": "6660", "trust": 1.7 }, { "db": "VUPEN", "id": "ADV-2008-2746", "trust": 1.6 }, { "db": "SREASON", "id": "4377", "trust": 1.6 }, { "db": "JVNDB", "id": "JVNDB-2008-006295", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-200810-126", "trust": 0.6 }, { "db": "EXPLOIT-DB", "id": "6661", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "70630", "trust": 0.1 } ], "sources": [ { "db": "BID", "id": "31556" }, { "db": "JVNDB", "id": "JVNDB-2008-006295" }, { "db": "PACKETSTORM", "id": "70630" }, { "db": "CNNVD", "id": "CNNVD-200810-126" }, { "db": "NVD", "id": "CVE-2008-4500" } ] }, "id": "VAR-200810-0276", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 1.0 }, "last_update_date": "2024-11-23T23:00:09.386000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top Page", "trust": 0.8, "url": "http://www.serv-u.com/" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2008-006295" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2008-006295" }, { "db": "NVD", "id": "CVE-2008-4500" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.6, "url": "http://securityreason.com/securityalert/4377" }, { "trust": 1.6, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45652" }, { "trust": 1.6, "url": "http://www.securityfocus.com/bid/31556" }, { "trust": 1.6, "url": "http://www.vupen.com/english/advisories/2008/2746" }, { "trust": 1.6, "url": "https://www.exploit-db.com/exploits/6660" }, { "trust": 1.6, "url": "http://secunia.com/advisories/32150" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-4500" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2008-4500" }, { "trust": 0.3, "url": "http://www.serv-u.com/" }, { "trust": 0.1, "url": "http://milw0rm.com/exploits/6660" }, { "trust": 0.1, "url": "http://secunia.com/binary_analysis/sample_analysis/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/32150/" }, { "trust": 0.1, "url": "http://milw0rm.com/exploits/6661" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "http://secunia.com/advisories/product/19573/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/about_secunia_advisories/" } ], "sources": [ { "db": "BID", "id": "31556" }, { "db": "JVNDB", "id": "JVNDB-2008-006295" }, { "db": "PACKETSTORM", "id": "70630" }, { "db": "CNNVD", "id": "CNNVD-200810-126" }, { "db": "NVD", "id": "CVE-2008-4500" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "BID", "id": "31556" }, { "db": "JVNDB", "id": "JVNDB-2008-006295" }, { "db": "PACKETSTORM", "id": "70630" }, { "db": "CNNVD", "id": "CNNVD-200810-126" }, { "db": "NVD", "id": "CVE-2008-4500" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2008-10-03T00:00:00", "db": "BID", "id": "31556" }, { "date": "2012-12-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2008-006295" }, { "date": "2008-10-06T22:35:25", "db": "PACKETSTORM", "id": "70630" }, { "date": "2008-10-09T00:00:00", "db": "CNNVD", "id": "CNNVD-200810-126" }, { "date": "2008-10-09T00:00:01.180000", "db": "NVD", "id": "CVE-2008-4500" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-05-07T17:22:00", "db": "BID", "id": "31556" }, { "date": "2012-12-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2008-006295" }, { "date": "2020-07-29T00:00:00", "db": "CNNVD", "id": "CNNVD-200810-126" }, { "date": "2024-11-21T00:51:49.830000", "db": "NVD", "id": "CVE-2008-4500" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-200810-126" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Serv-U Service disruption in (DoS) Vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2008-006295" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-200810-126" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.