Vulnerabilities > CVE-2004-1136 - Denial-Of-Service vulnerability in Globalscape Cuteftp 6.0

047910
CVSS 5.0 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
NONE
Availability impact
PARTIAL
network
low complexity
globalscape
nessus

Summary

Buffer overflow in CuteFTP Professional 6.0, and possibly other versions, allows remote FTP servers to cause a denial of service (application crash) via large replies to FTP commands.

Vulnerable Configurations

Part Description Count
Application
Globalscape
1

Nessus

NASL familyWindows
NASL idCUTEFTP_FLAWS2.NASL
descriptionThe remote host has the program CuteFTP.exe installed. CuteFTP is an FTP client which contains several buffer overflow conditions. Using this version of CuteFTP to connect to a malicious FTP server could cause the client to crash, or could result in arbitrary code execution.
last seen2020-06-01
modified2020-06-02
plugin id15860
published2004-11-30
reporterThis script is Copyright (C) 2004-2018 and is owned by Tenable, Inc. or an Affiliate thereof.
sourcehttps://www.tenable.com/plugins/nessus/15860
titleCuteFTP Professional FTP Command Response Remote Overflow
code
#
# (C) Tenable Network Security, Inc.
#


include("compat.inc");


if(description)
{
 script_id(15860);
 script_version("1.15");
 script_cve_id("CVE-2004-1136");
 script_bugtraq_id(11776);

 script_name(english:"CuteFTP Professional FTP Command Response Remote Overflow");
 script_summary(english:"Determines the presence of CuteFTP.exe");
 
 script_set_attribute(attribute:"synopsis", value:
"The FTP client installed on the remote Windows host has multiple
buffer overflow vulnerabilities." );
 script_set_attribute( attribute:"description",  value:
"The remote host has the program CuteFTP.exe installed.

CuteFTP is an FTP client which contains several buffer overflow
conditions.  Using this version of CuteFTP to connect to a malicious
FTP server could cause the client to crash, or could result in
arbitrary code execution." );
 script_set_attribute(
   attribute:"see_also",
   value:"https://seclists.org/bugtraq/2004/Nov/400"
 );
 script_set_attribute(
   attribute:"solution", 
   value:"Upgrade to the latest version of CuteFTP."
 );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
 script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"false");
 script_set_attribute(attribute:"plugin_publication_date", value: "2004/11/30");
 script_set_attribute(attribute:"vuln_publication_date", value: "2004/11/30");
 script_cvs_date("Date: 2018/11/15 20:50:26");
 script_set_attribute(attribute:"plugin_type", value:"local");
 script_end_attributes();

 script_category(ACT_GATHER_INFO);
 script_family(english:"Windows");
 script_copyright(english:"This script is Copyright (C) 2004-2018 and is owned by Tenable, Inc. or an Affiliate thereof.");
 script_dependencies("cuteftp_flaws.nasl");
 script_require_keys("SMB/Windows/Products/CuteFTP/Version");
 exit(0);
}

#

version = get_kb_item("SMB/Windows/Products/CuteFTP/Version");
if ( ! version ) exit(0);
if(ereg(pattern:"^([0-5]\.|6\.0\.0\.)", string:version))
  security_hole(get_kb_item("SMB/transport"));