Vulnerabilities > CVE-2004-1439 - Unspecified vulnerability in Sapporoworks Black Jumbodog 3.6.1
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Buffer overflow in BlackJumboDog 3.x allows remote attackers to execute arbitrary code via long FTP commands such as (1) USER, (2) PASS, (3) RETR,(4) CWD, (5) XMKD, and (6) XRMD.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Exploit-Db
description BlackJumboDog Remote Buffer Overflow Exploit. CVE-2004-1439. Remote exploit for windows platform id EDB-ID:378 last seen 2016-01-31 modified 2004-08-05 published 2004-08-05 reporter Tal Zeltzer source https://www.exploit-db.com/download/378/ title BlackJumboDog Remote Buffer Overflow Exploit description BlackJumboDog FTP Server 3.6.1 Remote Buffer Overflow Exploit. CVE-2004-1439. Remote exploit for windows platform id EDB-ID:439 last seen 2016-01-31 modified 2004-09-12 published 2004-09-12 reporter Delikon source https://www.exploit-db.com/download/439/ title BlackJumboDog FTP Server 3.6.1 - Remote Buffer Overflow Exploit
Nessus
NASL family | FTP |
NASL id | BLACK_JUMBODOG_FTP_OVERFLOW.NASL |
description | The remote host is running BlackJumboDog FTP server. This FTP server fails to properly check the length of parameters in multiple FTP commands, most significant of which is USER, resulting in a stack overflow. With a specially crafted request, an attacker can execute arbitrary code resulting in a loss of integrity, and/or availability. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 14256 |
published | 2004-08-11 |
reporter | This script is Copyright (C) 2004-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/14256 |
title | BlackJumboDog FTP Server Multiple Command Overflow |
code |
|
References
- http://secunia.com/advisories/12203
- http://secunia.com/advisories/12203
- http://www.ir3ip.net/pipermail/bugtraq/2004-September/009960.html
- http://www.ir3ip.net/pipermail/bugtraq/2004-September/009960.html
- http://www.kb.cert.org/vuls/id/714584
- http://www.kb.cert.org/vuls/id/714584
- http://www.security.org.sg/vuln/bjd361.html
- http://www.security.org.sg/vuln/bjd361.html
- http://www.securityfocus.com/bid/10834
- http://www.securityfocus.com/bid/10834
- https://exchange.xforce.ibmcloud.com/vulnerabilities/16842
- https://exchange.xforce.ibmcloud.com/vulnerabilities/16842