Vulnerabilities > CVE-2005-2426 - Unspecified vulnerability in Ftpshell Server 3.38
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
FTPshell Server 3.38 allows remote authenticated users to cause a denial of service (application crash) by multiple connections and disconnections without using the QUIT command.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Exploit-Db
description | FTPshell Server <= 3.38 Remote Denial of Service Exploit. CVE-2005-2426. Dos exploit for windows platform |
id | EDB-ID:1121 |
last seen | 2016-01-31 |
modified | 2005-07-26 |
published | 2005-07-26 |
reporter | Reed Arvin |
source | https://www.exploit-db.com/download/1121/ |
title | FTPshell Server <= 3.38 - Remote Denial of Service Exploit |
Nessus
NASL family | FTP |
NASL id | FTPSHELL_39DOS.NASL |
description | The remote host is using FTPshell, an FTP service for Windows. The version of FTPshell installed on the remote host suffers from a denial of service vulnerability that can be exploited by logging into the service, sending a PORT command, and closing the connection without QUITing, all 39 times. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 19303 |
published | 2005-07-27 |
reporter | This script is Copyright (C) 2005-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/19303 |
title | FTPshell Server 3.38 Malformed PORT/QUIT DoS |
code |
|
References
- http://marc.info/?l=bugtraq&m=112239297430460&w=2
- http://marc.info/?l=bugtraq&m=112239297430460&w=2
- http://secunia.com/advisories/16189
- http://secunia.com/advisories/16189
- http://securitytracker.com/id?1014580
- http://securitytracker.com/id?1014580
- http://www.securityfocus.com/bid/14382
- http://www.securityfocus.com/bid/14382
- https://exchange.xforce.ibmcloud.com/vulnerabilities/21531
- https://exchange.xforce.ibmcloud.com/vulnerabilities/21531