Vulnerabilities > CVE-2006-6565 - Null Pointer Dereference vulnerability in Filezilla-Project Filezilla Server 0.9.21/0.9.6
Attack vector
NETWORK Attack complexity
LOW Privileges required
SINGLE Confidentiality impact
NONE Integrity impact
NONE Availability impact
PARTIAL Summary
FileZilla Server before 0.9.22 allows remote attackers to cause a denial of service (crash) via a wildcard argument to the (1) LIST or (2) NLST commands, which results in a NULL pointer dereference, a different set of vectors than CVE-2006-6564. NOTE: CVE analysis suggests that the problem might be due to a malformed PORT command.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 2 |
Common Weakness Enumeration (CWE)
Exploit-Db
description | Filezilla FTP Server. CVE-2006-6564,CVE-2006-6565. Dos exploit for windows platform |
file | exploits/windows/dos/2914.php |
id | EDB-ID:2914 |
last seen | 2016-01-31 |
modified | 2006-12-11 |
platform | windows |
port | |
published | 2006-12-11 |
reporter | shinnai |
source | https://www.exploit-db.com/download/2914/ |
title | Filezilla FTP Server <= 0.9.21 - LIST/NLST Denial of Service Exploit |
type | dos |
Metasploit
description | This module triggers a Denial of Service condition in the FileZilla FTP Server versions 0.9.21 and earlier. By sending a malformed PORT command then LIST command, the server attempts to write to a NULL pointer. |
id | MSF:AUXILIARY/DOS/WINDOWS/FTP/FILEZILLA_SERVER_PORT |
last seen | 2020-06-12 |
modified | 2017-11-08 |
published | 2009-01-09 |
references | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6565 |
reporter | Rapid7 |
source | https://github.com/rapid7/metasploit-framework/blob/master//modules/auxiliary/dos/windows/ftp/filezilla_server_port.rb |
title | FileZilla FTP Server Malformed PORT Denial of Service |
Nessus
NASL family | Windows |
NASL id | FILEZILLA_SERVER_0922.NASL |
description | According to its version, the FileZilla Server Interface installed on the remote host is affected by several denial of service flaws, which could be leveraged by an authenticated attacker to crash the server and deny service to legitimate users. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 23831 |
published | 2006-12-12 |
reporter | This script is Copyright (C) 2006-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/23831 |
title | FileZilla FTP Server < 0.9.22 Wildcard Handling Remote DoS |
code |
|