Vulnerabilities > CVE-2008-5666 - Resource Management Errors vulnerability in Wftpserver Winftp FTP Server 2.3.0
Attack vector
NETWORK Attack complexity
MEDIUM Privileges required
SINGLE Confidentiality impact
NONE Integrity impact
NONE Availability impact
PARTIAL Summary
WinFTP FTP Server 2.3.0, when passive (aka PASV) mode is used, allows remote authenticated users to cause a denial of service via a sequence of FTP sessions that include an invalid "NLST -1" command.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Common Weakness Enumeration (CWE)
Exploit-Db
description WinFTP Server 2.3.0 (NLST) Denial of Service Exploit. CVE-2008-5666. Dos exploit for windows platform id EDB-ID:6581 last seen 2016-02-01 modified 2008-09-26 published 2008-09-26 reporter Julien Bedard source https://www.exploit-db.com/download/6581/ title WinFTP Server 2.3.0 NLST Denial of Service Exploit description WinFTP 2.3.0 (PASV mode) Remote Denial of Service Exploit. CVE-2008-5666. Dos exploit for windows platform file exploits/windows/dos/6717.py id EDB-ID:6717 last seen 2016-02-01 modified 2008-10-09 platform windows port published 2008-10-09 reporter dmnt source https://www.exploit-db.com/download/6717/ title WinFTP 2.3.0 PASV mode Remote Denial of Service Exploit type dos
Metasploit
description | This module is a very rough port of Julien Bedard's PoC. You need a valid login, but even anonymous can do it if it has permission to call NLST. |
id | MSF:AUXILIARY/DOS/WINDOWS/FTP/WINFTP230_NLST |
last seen | 2020-06-13 |
modified | 2017-07-24 |
published | 2008-09-30 |
references | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5666 |
reporter | Rapid7 |
source | https://github.com/rapid7/metasploit-framework/blob/master//modules/auxiliary/dos/windows/ftp/winftp230_nlst.rb |
title | WinFTP 2.3.0 NLST Denial of Service |