var-200810-0277
Vulnerability from variot
Directory traversal vulnerability in the FTP server in Serv-U 7.0.0.1 through 7.3, including 7.2.0.1, allows remote authenticated users to overwrite or create arbitrary files via a ..\ (dot dot backslash) in the RNTO command. Serv-U is prone to a directory traversal vulnerability. ----------------------------------------------------------------------
Do you need accurate and reliable IDS / IPS / AV detection rules?
Get in-depth vulnerability details: http://secunia.com/binary_analysis/sample_analysis/
TITLE: Serv-U File Renaming Directory Traversal and STOU Denial of Service
SECUNIA ADVISORY ID: SA32150
VERIFY ADVISORY: http://secunia.com/advisories/32150/
CRITICAL: Moderately critical
IMPACT: DoS, System access
WHERE:
From remote
SOFTWARE: Serv-U File Server 7.x http://secunia.com/advisories/product/19573/
DESCRIPTION: dmnt has discovered two vulnerabilities in Serv-U, which can be exploited by malicious users to cause a DoS (Denial of Service) or compromise a vulnerable system.
1) An error in the handling of the "STOU" FTP command can be exploited to exhaust available CPU resources via a specially crafted argument (e.g. "CON:1").
The vulnerabilities are confirmed in version 7.3.0.0. Other versions may also be affected.
SOLUTION: Restrict access to the FTP service.
PROVIDED AND/OR DISCOVERED BY: dmnt
ORIGINAL ADVISORY: http://milw0rm.com/exploits/6660 http://milw0rm.com/exploits/6661
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200810-0277", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "serv-u file server", "scope": "eq", "trust": 1.0, "vendor": "solarwinds", "version": "7.3.0.0" }, { "model": "serv-u file server", "scope": "eq", "trust": 1.0, "vendor": "solarwinds", "version": "7.2.0.0" }, { "model": "serv-u file server", "scope": "eq", "trust": 1.0, "vendor": "solarwinds", "version": "7.1.0.0" }, { "model": "serv-u file server", "scope": "eq", "trust": 1.0, "vendor": "solarwinds", "version": "7.1.0.2" }, { "model": "serv-u file server", "scope": "eq", "trust": 1.0, "vendor": "solarwinds", "version": "7.0.0.3" }, { "model": "serv-u file server", "scope": "eq", "trust": 1.0, "vendor": "solarwinds", "version": "7.0.0.4" }, { "model": "serv-u file server", "scope": "eq", "trust": 1.0, "vendor": "solarwinds", "version": "7.1.0.1" }, { "model": "serv-u file server", "scope": "eq", "trust": 1.0, "vendor": "solarwinds", "version": "7.0.0.1" }, { "model": "serv-u file server", "scope": "eq", "trust": 1.0, "vendor": "solarwinds", "version": "7.0.0.2" }, { "model": "serv-u file server", "scope": "eq", "trust": 1.0, "vendor": "solarwinds", "version": "7.3.0.1" }, { "model": "serv-u file server", "scope": "eq", "trust": 1.0, "vendor": "solarwinds", "version": "7.2.0.1" }, { "model": "serv-u file server", "scope": "eq", "trust": 1.0, "vendor": "solarwinds", "version": "7.3.0.2" }, { "model": "serv-u ftp server", "scope": "eq", "trust": 0.8, "vendor": "rhino", "version": "7.0.0.1 to 7.2.0.1 including 7.3" }, { "model": "serv-u", "scope": "eq", "trust": 0.6, "vendor": "serv u", "version": "7.2.0.0" }, { "model": "serv-u", "scope": "eq", "trust": 0.6, "vendor": "serv u", "version": "7.1.0.0" }, { "model": "serv-u", "scope": "eq", "trust": 0.6, "vendor": "serv u", "version": "7.2.0.1" }, { "model": "serv-u", "scope": "eq", "trust": 0.6, "vendor": "serv u", "version": "7.0.0.4" }, { "model": "serv-u", "scope": "eq", "trust": 0.6, "vendor": "serv u", "version": "7.0.0.3" }, { "model": "serv-u", "scope": "eq", "trust": 0.6, "vendor": "serv u", "version": "7.3.0.0" }, { "model": "serv-u", "scope": "eq", "trust": 0.6, "vendor": "serv u", "version": "7.3.0.1" }, { "model": "serv-u", "scope": "eq", "trust": 0.6, "vendor": "serv u", "version": "7.3.0.2" }, { "model": "serv-u", "scope": "eq", "trust": 0.6, "vendor": "serv u", "version": "7.1.0.2" }, { "model": "serv-u", "scope": "eq", "trust": 0.6, "vendor": "serv u", "version": "7.1.0.1" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2008-006296" }, { "db": "CNNVD", "id": "CNNVD-200810-127" }, { "db": "NVD", "id": "CVE-2008-4501" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:serv-u:serv-u", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2008-006296" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Unknown", "sources": [ { "db": "BID", "id": "84767" } ], "trust": 0.3 }, "cve": "CVE-2008-4501", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.0, "id": "CVE-2008-4501", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2008-4501", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2008-4501", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-200810-127", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2008-006296" }, { "db": "CNNVD", "id": "CNNVD-200810-127" }, { "db": "NVD", "id": "CVE-2008-4501" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Directory traversal vulnerability in the FTP server in Serv-U 7.0.0.1 through 7.3, including 7.2.0.1, allows remote authenticated users to overwrite or create arbitrary files via a ..\\ (dot dot backslash) in the RNTO command. Serv-U is prone to a directory traversal vulnerability. ----------------------------------------------------------------------\n\nDo you need accurate and reliable IDS / IPS / AV detection rules?\n\nGet in-depth vulnerability details:\nhttp://secunia.com/binary_analysis/sample_analysis/\n\n----------------------------------------------------------------------\n\nTITLE:\nServ-U File Renaming Directory Traversal and STOU Denial of Service\n\nSECUNIA ADVISORY ID:\nSA32150\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/32150/\n\nCRITICAL:\nModerately critical\n\nIMPACT:\nDoS, System access\n\nWHERE:\n\u003eFrom remote\n\nSOFTWARE:\nServ-U File Server 7.x\nhttp://secunia.com/advisories/product/19573/\n\nDESCRIPTION:\ndmnt has discovered two vulnerabilities in Serv-U, which can be\nexploited by malicious users to cause a DoS (Denial of Service) or\ncompromise a vulnerable system. \n\n1) An error in the handling of the \"STOU\" FTP command can be\nexploited to exhaust available CPU resources via a specially crafted\nargument (e.g. \"CON:1\"). \n\nThe vulnerabilities are confirmed in version 7.3.0.0. Other versions\nmay also be affected. \n\nSOLUTION:\nRestrict access to the FTP service. \n\nPROVIDED AND/OR DISCOVERED BY:\ndmnt\n\nORIGINAL ADVISORY:\nhttp://milw0rm.com/exploits/6660\nhttp://milw0rm.com/exploits/6661\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2008-4501" }, { "db": "JVNDB", "id": "JVNDB-2008-006296" }, { "db": "BID", "id": "84767" }, { "db": "PACKETSTORM", "id": "70630" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2008-4501", "trust": 2.7 }, { "db": "EXPLOIT-DB", "id": "6661", "trust": 2.0 }, { "db": "SREASON", "id": "4378", "trust": 1.9 }, { "db": "SECUNIA", "id": "32150", "trust": 1.8 }, { "db": "VUPEN", "id": "ADV-2008-2746", "trust": 1.6 }, { "db": "JVNDB", "id": "JVNDB-2008-006296", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-200810-127", "trust": 0.6 }, { "db": "BID", "id": "84767", "trust": 0.3 }, { "db": "EXPLOIT-DB", "id": "6660", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "70630", "trust": 0.1 } ], "sources": [ { "db": "BID", "id": "84767" }, { "db": "JVNDB", "id": "JVNDB-2008-006296" }, { "db": "PACKETSTORM", "id": "70630" }, { "db": "CNNVD", "id": "CNNVD-200810-127" }, { "db": "NVD", "id": "CVE-2008-4501" } ] }, "id": "VAR-200810-0277", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 1.0 }, "last_update_date": "2024-11-23T23:00:09.355000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top Page", "trust": 0.8, "url": "http://www.serv-u.com/" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2008-006296" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-22", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2008-006296" }, { "db": "NVD", "id": "CVE-2008-4501" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.9, "url": "http://securityreason.com/securityalert/4378" }, { "trust": 1.6, "url": "https://www.exploit-db.com/exploits/6661" }, { "trust": 1.6, "url": "http://www.vupen.com/english/advisories/2008/2746" }, { "trust": 1.6, "url": "http://secunia.com/advisories/32150" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-4501" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2008-4501" }, { "trust": 0.3, "url": "http://www.milw0rm.com/exploits/6661" }, { "trust": 0.1, "url": "http://milw0rm.com/exploits/6660" }, { "trust": 0.1, "url": "http://secunia.com/binary_analysis/sample_analysis/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/32150/" }, { "trust": 0.1, "url": "http://milw0rm.com/exploits/6661" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "http://secunia.com/advisories/product/19573/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/about_secunia_advisories/" } ], "sources": [ { "db": "BID", "id": "84767" }, { "db": "JVNDB", "id": "JVNDB-2008-006296" }, { "db": "PACKETSTORM", "id": "70630" }, { "db": "CNNVD", "id": "CNNVD-200810-127" }, { "db": "NVD", "id": "CVE-2008-4501" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "BID", "id": "84767" }, { "db": "JVNDB", "id": "JVNDB-2008-006296" }, { "db": "PACKETSTORM", "id": "70630" }, { "db": "CNNVD", "id": "CNNVD-200810-127" }, { "db": "NVD", "id": "CVE-2008-4501" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2008-10-08T00:00:00", "db": "BID", "id": "84767" }, { "date": "2012-12-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2008-006296" }, { "date": "2008-10-06T22:35:25", "db": "PACKETSTORM", "id": "70630" }, { "date": "2008-10-09T00:00:00", "db": "CNNVD", "id": "CNNVD-200810-127" }, { "date": "2008-10-09T00:00:01.213000", "db": "NVD", "id": "CVE-2008-4501" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2008-10-08T00:00:00", "db": "BID", "id": "84767" }, { "date": "2012-12-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2008-006296" }, { "date": "2020-07-29T00:00:00", "db": "CNNVD", "id": "CNNVD-200810-127" }, { "date": "2024-11-21T00:51:49.993000", "db": "NVD", "id": "CVE-2008-4501" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-200810-127" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Serv-U of FTP Server traversal vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2008-006296" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "path traversal", "sources": [ { "db": "CNNVD", "id": "CNNVD-200810-127" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.