Vulnerabilities > CVE-2011-0507 - Buffer Overflow vulnerability in Blackmoonftpserver Blackmoon FTP Server 3.1/3.1.7.1735/3.1.7.1736

047910
CVSS 4.3 - MEDIUM
Attack vector
NETWORK
Attack complexity
MEDIUM
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
NONE
Availability impact
PARTIAL
network
blackmoonftpserver
nessus
exploit available

Summary

FTPService.exe in Blackmoon FTP 3.1 Build 1735 and Build 1736 (3.1.7.1736), and possibly other versions before 3.1.8.1737, allows remote attackers to cause a denial of service (crash) via a large number of PORT commands with long arguments, which triggers a NULL pointer dereference. NOTE: some of these details are obtained from third party information. Per: http://cwe.mitre.org/data/definitions/476.html 'CWE-476: NULL Pointer Dereference'

Exploit-Db

descriptionBlackmoon FTP 3.1 Build 1735/1736 - DoS. CVE-2011-0507. Dos exploit for windows platform
fileexploits/windows/dos/15986.py
idEDB-ID:15986
last seen2016-02-01
modified2011-01-13
platformwindows
port
published2011-01-13
reporterCraig Freyman
sourcehttps://www.exploit-db.com/download/15986/
titleBlackmoon FTP 3.1 Build 1735/1736 - DoS
typedos

Nessus

NASL familyFTP
NASL idBLACKMOON_FTP_DOS.NASL
descriptionAccording to its self-reported version number, the remote FTP server is running a version of BlackMoon FTP Server earlier than 3.1.8. Such versions reportedly are affected by a denial of service vulnerability. By sending an overly long PORT command, a remote, unauthenticated attacker may be able to crash the service and deny access to legitimate users.
last seen2020-06-01
modified2020-06-02
plugin id51585
published2011-01-20
reporterThis script is Copyright (C) 2011-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/51585
titleBlackMoon FTP Server Denial of Service
code
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
  script_id(51585);
  script_version("1.11");
  script_cvs_date("Date: 2018/06/27 18:42:25");

  script_cve_id("CVE-2011-0507");
  script_bugtraq_id(45814);
  script_xref(name:"EDB-ID", value:"15986");
  script_xref(name:"Secunia", value:"42933");

  script_name(english:"BlackMoon FTP Server Denial of Service");
  script_summary(english:"Checks version reported in FTP banner");

  script_set_attribute(attribute:"synopsis", value:
"The remote FTP service is vulnerable to a denial of service
attack.");
  script_set_attribute(attribute:"description", value:
"According to its self-reported version number, the remote FTP server
is running a version of BlackMoon FTP Server earlier than 3.1.8.  Such
versions reportedly are affected by a denial of service vulnerability. 
By sending an overly long PORT command, a remote, unauthenticated
attacker may be able to crash the service and deny access to
legitimate users.");

  script_set_attribute(attribute:"see_also", value:"http://www.blackmoonftpserver.com/");
  script_set_attribute(attribute:"solution", value:
"Reports conflict as to whether this issue was fixed in 3.1.7 or
3.1.8. Upgrade to version 3.1.8 or later to be safe.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"true");
  script_set_attribute(attribute:"exploit_framework_core", value:"true");
  script_set_attribute(attribute:"vuln_publication_date", value:"2011/01/13");
  script_set_attribute(attribute:"patch_publication_date", value:"2011/01/13");
  script_set_attribute(attribute:"plugin_publication_date", value:"2011/01/20");
  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"FTP");

  script_copyright(english:"This script is Copyright (C) 2011-2018 Tenable Network Security, Inc.");

  script_dependencies("ftpserver_detect_type_nd_version.nasl");
  script_require_ports("Services/ftp", 21);

  exit(0);
}

include("global_settings.inc");
include("ftp_func.inc");
include("misc_func.inc");

# Fetch FTP banner.
port = get_ftp_port(default: 21);

banner = get_ftp_banner(port:port);
if (isnull(banner)) exit(1, "Unable to obtain a banner from the FTP server listening on port "+port+".");

# Check if it's BlackMoon FTP.
if ("BlackMoon FTP Server" >!< banner) exit(0, "The FTP server listening on port "+port+" is not BlackMoon FTP.");

# Parse the version string.
match = eregmatch(string:banner, pattern:"(Version |v)([0-9]+\.[0-9]+\.[0-9]+)");
if (isnull(match)) exit(1, "Could not determine version of BlackMoon FTP listening on port "+port+".");
version = match[2];

# Check if the version string is below the first fixed version.
fixed = "3.1.8";
if (ver_compare(ver:version, fix:fixed) >= 0) exit(0, "Version "+version+" of BlackMoon FTP is listening on port "+port+" and thus not affected.");

# Generate a security report.
if (report_verbosity > 0)
{
  report = 
    '\n  Version source    : ' + banner +
    '\n  Installed version : ' + version + 
    '\n  Fixed version     : ' + fixed + '\n';
  security_warning(port:port, extra:report);
}
else security_warning(port);