Vulnerabilities > CVE-2006-2961 - Commands Remote Buffer Overflow vulnerability in ACLogic CesarFTP

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
aclogic
nessus
exploit available
metasploit

Summary

Stack-based buffer overflow in CesarFTP 0.99g and earlier allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a long MKD command. NOTE: the provenance of this information is unknown; the details are obtained from third party information.

Vulnerable Configurations

Part Description Count
Application
Aclogic
1

Exploit-Db

  • descriptionCesarFTP 0.99g (MKD) Remote Buffer Overflow Exploit. CVE-2006-2961. Remote exploit for windows platform
    idEDB-ID:1906
    last seen2016-01-31
    modified2006-06-12
    published2006-06-12
    reporterh07
    sourcehttps://www.exploit-db.com/download/1906/
    titleCesarFTP 0.99g - MKD Remote Buffer Overflow Exploit
  • descriptionCesarFTP 0.99g - XCWD Denial of Service. CVE-2006-2961. Dos exploit for windows platform
    idEDB-ID:39274
    last seen2016-02-04
    modified2016-01-19
    published2016-01-19
    reporterIrving Aguilar
    sourcehttps://www.exploit-db.com/download/39274/
    titleCesarFTP 0.99g - XCWD Denial of Service
  • descriptionCesar FTP 0.99g MKD Command Buffer Overflow. CVE-2006-2961. Remote exploit for windows platform
    idEDB-ID:16713
    last seen2016-02-02
    modified2011-02-23
    published2011-02-23
    reportermetasploit
    sourcehttps://www.exploit-db.com/download/16713/
    titleCesar FTP 0.99g - MKD Command Buffer Overflow

Metasploit

descriptionThis module exploits a stack buffer overflow in the MKD verb in CesarFTP 0.99g. You must have valid credentials to trigger this vulnerability. Also, you only get one chance, so choose your target carefully.
idMSF:EXPLOIT/WINDOWS/FTP/CESARFTP_MKD
last seen2020-01-13
modified2017-07-24
published2006-11-12
references
reporterRapid7
sourcehttps://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/windows/ftp/cesarftp_mkd.rb
titleCesar FTP 0.99g MKD Command Buffer Overflow

Nessus

NASL familyFTP
NASL idCESARFTP_OVERFLOWS.NASL
descriptionThe remote host is running CesarFTP, an FTP server for Windows systems. There are multiple flaws in this version of CesarFTP that could allow an attacker to execute arbitrary code on this host, or simply to disable this server remotely.
last seen2020-06-01
modified2020-06-02
plugin id11755
published2003-06-18
reporterThis script is Copyright (C) 2003-2018 and is owned by Tenable, Inc. or an Affiliate thereof.
sourcehttps://www.tenable.com/plugins/nessus/11755
titleCesarFTP Multiple Vulnerabilities (OF, File Access, more)

Packetstorm

data sourcehttps://packetstormsecurity.com/files/download/83077/cesarftp_mkd.rb.txt
idPACKETSTORM:83077
last seen2016-12-05
published2009-11-26
reporterMC
sourcehttps://packetstormsecurity.com/files/83077/Cesar-FTP-0.99g-MKD-Command-Buffer-Overflow.html
titleCesar FTP 0.99g MKD Command Buffer Overflow