Vulnerabilities > CVE-2006-0441 - Buffer Overflow vulnerability in Karjasoft Sami FTP Server 2.0.1
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
PARTIAL Availability impact
PARTIAL Summary
Stack-based buffer overflow in Sami FTP Server 2.0.1 allows remote attackers to execute arbitrary code via a long USER command, which triggers the overflow when the log is viewed.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Exploit-Db
description Sami FTP Server 2.0.1 Remote Stack Based Buffer Overflow PoC. CVE-2006-0441. Remote exploit for windows platform id EDB-ID:1448 last seen 2016-01-31 modified 2006-01-25 published 2006-01-25 reporter Critical Security source https://www.exploit-db.com/download/1448/ title Sami FTP Server 2.0.1 - Remote Stack Based Buffer Overflow PoC description Sami FTP Server 2.0.1 Remote Buffer Overflow Exploit (cpp). CVE-2006-0441. Remote exploit for windows platform id EDB-ID:1462 last seen 2016-01-31 modified 2006-01-31 published 2006-01-31 reporter HolyGhost source https://www.exploit-db.com/download/1462/ title Sami FTP Server 2.0.1 - Remote Buffer Overflow Exploit cpp description Sami FTP Server 2.0.2 (USER/PASS) Remote Buffer Overflow PoC. CVE-2006-0441. Dos exploit for windows platform id EDB-ID:3127 last seen 2016-01-31 modified 2007-01-14 published 2007-01-14 reporter Marsu source https://www.exploit-db.com/download/3127/ title Sami FTP Server 2.0.2 USER/PASS Remote Buffer Overflow PoC description KarjaSoft Sami FTP Server v2.02 USER Overflow. CVE-2006-0441,CVE-2006-2212. Remote exploit for windows platform id EDB-ID:16702 last seen 2016-02-02 modified 2010-04-30 published 2010-04-30 reporter metasploit source https://www.exploit-db.com/download/16702/ title KarjaSoft Sami FTP Server 2.02 - USER Overflow description KarjaSoft Sami FTP Server 2.0.2 - USER/PASS Remote Buffer Overflow (SEH). CVE-2006-0441. Remote exploit for Windows platform file exploits/windows/remote/40675.py id EDB-ID:40675 last seen 2016-11-01 modified 2016-11-01 platform windows port published 2016-11-01 reporter n30m1nd source https://www.exploit-db.com/download/40675/ title KarjaSoft Sami FTP Server 2.0.2 - USER/PASS Remote Buffer Overflow (SEH) type remote description Sami FTP Server 2.0.2 (USER/PASS) Remote Buffer Overflow Exploit. CVE-2006-0441. Remote exploit for windows platform id EDB-ID:3140 last seen 2016-01-31 modified 2007-01-17 published 2007-01-17 reporter UmZ source https://www.exploit-db.com/download/3140/ title Sami FTP Server 2.0.2 USER/PASS Remote Buffer Overflow Exploit
Metasploit
description | This module exploits the KarjaSoft Sami FTP Server version 2.02 by sending an excessively long USER string. The stack is overwritten when the administrator attempts to view the FTP logs. Therefore, this exploit is passive and requires end-user interaction. Keep this in mind when selecting payloads. When the server is restarted, it will re-execute the exploit until the logfile is manually deleted via the file system. |
id | MSF:EXPLOIT/WINDOWS/FTP/SAMI_FTPD_USER |
last seen | 2020-01-14 |
modified | 2017-11-08 |
published | 2008-03-17 |
references | |
reporter | Rapid7 |
source | https://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/windows/ftp/sami_ftpd_user.rb |
title | KarjaSoft Sami FTP Server v2.02 USER Overflow |
Packetstorm
data source https://packetstormsecurity.com/files/download/83185/sami_ftpd_user.rb.txt id PACKETSTORM:83185 last seen 2016-12-05 published 2009-11-26 reporter patrick source https://packetstormsecurity.com/files/83185/KarjaSoft-Sami-FTP-Server-v2.02-USER-Overflow.html title KarjaSoft Sami FTP Server v2.02 USER Overflow data source https://packetstormsecurity.com/files/download/139468/karjasoftsamiftp-overflow.txt id PACKETSTORM:139468 last seen 2016-12-05 published 2016-11-01 reporter n30m1nd source https://packetstormsecurity.com/files/139468/KarjaSoft-Sami-FTP-Server-2.0.2-Buffer-Overflow.html title KarjaSoft Sami FTP Server 2.0.2 Buffer Overflow
References
- http://downloads.securityfocus.com/vulnerabilities/exploits/sami_ftp_poc.pl
- http://secunia.com/advisories/18574
- http://www.critical.lt/?vulnerabilities/208
- http://www.karjasoft.com/samiftp/news
- http://www.securityfocus.com/archive/1/423148/100/0/threaded
- http://www.securityfocus.com/bid/16370
- http://www.vupen.com/english/advisories/2006/0317
- https://exchange.xforce.ibmcloud.com/vulnerabilities/24325
- https://www.exploit-db.com/exploits/40675/