Vulnerabilities > CVE-2006-1693 - Remote Denial of Service vulnerability in GlobalSCAPE Secure FTP Server

047910
CVSS 5.0 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
NONE
Availability impact
PARTIAL
network
low complexity
globalscape
nessus

Summary

Unspecified vulnerability in GlobalSCAPE Secure FTP Server before 3.1.4 Build 01.10.2006 allows attackers to cause a denial of service (application crash) via a "custom command" with a long argument. This issue is addressed in Secure FTP Server 3.1.4 Build 01.10.2006.

Nessus

NASL familyFTP
NASL idGLOBALSCAPEFTP_314.NASL
descriptionGlobalSCAPE Secure FTP Server is installed on the remote Windows host. According to the registry, the version of GlobalSCAPE Secure FTP Server on the remote host is affected by a denial of service vulnerability involving a lengthy parameter line to an unspecified custom command.
last seen2020-06-01
modified2020-06-02
plugin id21188
published2006-04-07
reporterThis script is Copyright (C) 2006-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/21188
titleGlobalSCAPE Secure FTP Server (gsftps) Custom Command Long Parameter DoS
code
#
#  (C) Tenable Network Security, Inc.
#


include("compat.inc");

if (description)
{
  script_id(21188);
  script_version("1.14");

  script_cve_id("CVE-2006-1693");
  script_bugtraq_id(17398);

  script_name(english:"GlobalSCAPE Secure FTP Server (gsftps) Custom Command Long Parameter DoS");
  script_summary(english:"Checks version of GlobalSCAPE Secure FTP"); 
 
 script_set_attribute(attribute:"synopsis", value:
"The remote FTP server is prone to denial of service attacks." );
 script_set_attribute(attribute:"description", value:
"GlobalSCAPE Secure FTP Server is installed on the remote Windows host. 

According to the registry, the version of GlobalSCAPE Secure FTP
Server on the remote host is affected by a denial of service
vulnerability involving a lengthy parameter line to an unspecified
custom command." );
 script_set_attribute(attribute:"see_also", value:"http://www.globalscape.com/gsftps/history.asp" );
 script_set_attribute(attribute:"solution", value:
"Upgrade to GlobalSCAPE Secure FTP Server 3.1.4 Build 01.10.2006 or
later." );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
 script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"false");
 script_set_attribute(attribute:"plugin_publication_date", value: "2006/04/07");
 script_set_attribute(attribute:"vuln_publication_date", value: "2006/01/10");
 script_cvs_date("Date: 2018/07/12 19:01:15");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_end_attributes();

 
  script_category(ACT_GATHER_INFO);
  script_family(english:"FTP");
  script_copyright(english:"This script is Copyright (C) 2006-2018 Tenable Network Security, Inc.");
  script_dependencies("ftpserver_detect_type_nd_version.nasl", "smb_hotfixes.nasl");
  script_require_keys("SMB/Registry/Enumerated");
  script_require_ports("Services/ftp", 21, 139, 445);

  exit(0);
}


include("ftp_func.inc");
include("global_settings.inc");


if (!get_kb_item("SMB/Registry/Enumerated")) exit(1);

# Get the version number from the registry.
key = "SMB/Registry/HKLM/SOFTWARE/Microsoft/Windows/CurrentVersion/Uninstall/{C680402D-A6CD-11D5-804F-00010246ECC0}/DisplayVersion";
ver = get_kb_item(key);


# If it looks vulnerable...
if (ver && ver =~ "^([0-2]\.|3\.(0\.|1\.[0-3]))") 
{
  # Make sure it's running.
  port = get_ftp_port(default: 21);

  # Unless we're paranoid...
  if (report_paranoia < 2)
  {
    # Make sure the banner says it's GlobalSCAPE.
    banner = get_ftp_banner(port:port);
    if (!banner || "GlobalSCAPE Secure FTP Server" >!< banner) exit(0);
  }

  security_warning(port);
}