Vulnerabilities > CVE-2005-0696 - Remote Buffer Overrun vulnerability in Argosoft FTP Server 1.4.2.29/1.4.2.8/1.4.3.5

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
argosoft
nessus

Summary

Buffer overflow in ArGoSoft FTP Server 1.4.2.8 allows remote authenticated users to execute arbitrary code via a long DELE command. NOTE: this issue was later reported to also affect 1.4.3.5.

Vulnerable Configurations

Part Description Count
Application
Argosoft
3

Nessus

NASL familyFTP
NASL idARGOSOFT_FTP_DELE_OVERFLOW.NASL
descriptionAccording to its banner, the version of ArGoSoft FTP Server installed on the remote host is affected by a heap-based buffer overflow that can be triggered by a malicious user with delete rights who issues a DELE command with an argument exceeding 2000 characters.
last seen2020-06-01
modified2020-06-02
plugin id17303
published2005-03-09
reporterThis script is Copyright (C) 2005-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/17303
titleArGoSoft FTP Server DELE Command Remote Buffer Overrun
code
#
# (C) Tenable Network Security, Inc.
#


include("compat.inc");

if (description) {
  script_id(17303);
  script_version("1.18");

  script_cve_id("CVE-2005-0696");
  script_bugtraq_id(12755);

  script_name(english:"ArGoSoft FTP Server DELE Command Remote Buffer Overrun");

 script_set_attribute(attribute:"synopsis", value:
"The remote FTP server is affected by a buffer overflow flaw." );
 script_set_attribute(attribute:"description", value:
"According to its banner, the version of ArGoSoft FTP Server installed
on the remote host is affected by a heap-based buffer overflow that
can be triggered by a malicious user with delete rights who issues a
DELE command with an argument exceeding 2000 characters." );
 script_set_attribute(attribute:"see_also", value:"https://www.securityfocus.com/archive/1/archive/1/426081/100/0/threaded" );
 script_set_attribute(attribute:"solution", value:
"Unknown at this time." );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:S/C:P/I:P/A:P");
 script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"false");
 script_set_attribute(attribute:"plugin_publication_date", value: "2005/03/09");
 script_set_attribute(attribute:"vuln_publication_date", value: "2005/03/08");
 script_cvs_date("Date: 2018/11/15 20:50:22");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_end_attributes();


  script_summary(english:"Checks for DELE command remote buffer overrun in ArGoSoft FTP Server");
  script_category(ACT_GATHER_INFO);
  script_family(english:"FTP");
  script_copyright(english:"This script is Copyright (C) 2005-2018 Tenable Network Security, Inc.");
  script_dependencie("ftpserver_detect_type_nd_version.nasl");
  script_require_ports("Services/ftp", 21);
  exit(0);
}


include("ftp_func.inc");

port = get_ftp_port(default: 21);

banner = get_ftp_banner(port:port);
if (
  banner &&
  "ArGoSoft FTP Server" >< banner &&
  egrep(pattern:"^220[- ]ArGoSoft FTP Server.*Version.*\(1\.([0-3]\..*|4\.[0-1]|4\.2\.[0-8])", string:banner)
) security_warning(port);