Vulnerabilities > CVE-2014-1441 - Race Condition vulnerability in Coreftp Core FTP 1.2
Attack vector
NETWORK Attack complexity
MEDIUM Privileges required
NONE Confidentiality impact
NONE Integrity impact
NONE Availability impact
PARTIAL Summary
Core FTP Server 1.2 before build 515 allows remote attackers to cause a denial of service (reachable assertion and crash) via an AUTH SSL command with malformed data, as demonstrated by pressing the enter key twice.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Common Weakness Enumeration (CWE)
Common Attack Pattern Enumeration and Classification (CAPEC)
- Leveraging Race Conditions This attack targets a race condition occurring when multiple processes access and manipulate the same resource concurrently and the outcome of the execution depends on the particular order in which the access takes place. The attacker can leverage a race condition by "running the race", modifying the resource and modifying the normal execution flow. For instance a race condition can occur while accessing a file, the attacker can trick the system by replacing the original file with his version and cause the system to read the malicious file.
- Leveraging Time-of-Check and Time-of-Use (TOCTOU) Race Conditions This attack targets a race condition occurring between the time of check (state) for a resource and the time of use of a resource. The typical example is the file access. The attacker can leverage a file access race condition by "running the race", meaning that he would modify the resource between the first time the target program accesses the file and the time the target program uses the file. During that period of time, the attacker could do something such as replace the file and cause an escalation of privilege.
Nessus
NASL family | FTP |
NASL id | COREFTP_SERVER_1_2_515.NASL |
description | The version of Core FTP running on the remote host is prior to 1.2 build 515. It is, therefore, affected by multiple vulnerabilities : - A denial of service vulnerability exists that is triggered when handling malformed data after the |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 72662 |
published | 2014-02-24 |
reporter | This script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/72662 |
title | Core FTP Server < 1.2 Build 515 Multiple Vulnerabilities |
code |
|
Packetstorm
data source | https://packetstormsecurity.com/files/download/125073/core-traversaldosdisclose.txt |
id | PACKETSTORM:125073 |
last seen | 2016-12-05 |
published | 2014-02-05 |
reporter | Fara Denise Rustein |
source | https://packetstormsecurity.com/files/125073/Core-FTP-Server-1.2-DoS-Traversal-Disclosure.html |
title | Core FTP Server 1.2 DoS / Traversal / Disclosure |
Seebug
bulletinFamily | exploit |
description | BUGTRAQ ID: 65432 CVE(CAN) ID: CVE-2014-1441 CoreFTP是免费的FTP客户端。 Core FTP 1.2 build 511及其他版本处理AUTH SSL命令时存在错误,这可使攻击者通过特制的SSL证书,造成服务器崩溃。 0 Core FTP Core FTP 1.x 厂商补丁: Core FTP -------- 目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载: http://www.coreftp.com/ |
id | SSV:61538 |
last seen | 2017-11-19 |
modified | 2014-02-24 |
published | 2014-02-24 |
reporter | Root |
title | Core FTP 'AUTH SSL' 命令拒绝服务漏洞 |