Vulnerabilities > CVE-2008-5666 - Resource Management Errors vulnerability in Wftpserver Winftp FTP Server 2.3.0
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
WinFTP FTP Server 2.3.0, when passive (aka PASV) mode is used, allows remote authenticated users to cause a denial of service via a sequence of FTP sessions that include an invalid "NLST -1" command.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Common Weakness Enumeration (CWE)
Exploit-Db
description WinFTP Server 2.3.0 (NLST) Denial of Service Exploit. CVE-2008-5666. Dos exploit for windows platform id EDB-ID:6581 last seen 2016-02-01 modified 2008-09-26 published 2008-09-26 reporter Julien Bedard source https://www.exploit-db.com/download/6581/ title WinFTP Server 2.3.0 NLST Denial of Service Exploit description WinFTP 2.3.0 (PASV mode) Remote Denial of Service Exploit. CVE-2008-5666. Dos exploit for windows platform file exploits/windows/dos/6717.py id EDB-ID:6717 last seen 2016-02-01 modified 2008-10-09 platform windows port published 2008-10-09 reporter dmnt source https://www.exploit-db.com/download/6717/ title WinFTP 2.3.0 PASV mode Remote Denial of Service Exploit type dos
Metasploit
description | This module is a very rough port of Julien Bedard's PoC. You need a valid login, but even anonymous can do it if it has permission to call NLST. |
id | MSF:AUXILIARY/DOS/WINDOWS/FTP/WINFTP230_NLST |
last seen | 2020-06-13 |
modified | 2017-07-24 |
published | 2008-09-30 |
references | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5666 |
reporter | Rapid7 |
source | https://github.com/rapid7/metasploit-framework/blob/master//modules/auxiliary/dos/windows/ftp/winftp230_nlst.rb |
title | WinFTP 2.3.0 NLST Denial of Service |
References
- http://secunia.com/advisories/32209
- http://secunia.com/advisories/32209
- http://securityreason.com/securityalert/4785
- http://securityreason.com/securityalert/4785
- http://www.securitytracker.com/id?1021040
- http://www.securitytracker.com/id?1021040
- http://www.vupen.com/english/advisories/2008/2801
- http://www.vupen.com/english/advisories/2008/2801
- https://exchange.xforce.ibmcloud.com/vulnerabilities/45806
- https://exchange.xforce.ibmcloud.com/vulnerabilities/45806
- https://www.exploit-db.com/exploits/6717
- https://www.exploit-db.com/exploits/6717