FTP
All Categories
Buffer overflow in ProFTPD, wu-ftpd, and beroftpd allows remote attackers to gain root access via a series of MKD and CWD commands that create nested directories.
Dragon FTP server allows remote attackers to cause a denial of service via a long USER command.
Argosoft FRP server 1.0 allows remote attackers to cause a denial of service, and possibly execute arbitrary commands, via a long string to the (1) USER or (2) CWD commands.
Buffer overflow in AnalogX proxy server 4.04 and earlier allows remote attackers to cause a denial of service via a long USER command in the FTP protocol.
Buffer overflows in TYPSoft FTP Server 0.78 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary commands via a long USER, PASS, or CWD command.
Buffer overflow in bftpd 1.0.13 allows remote attackers to cause a denial of service and possibly execute arbitrary commands via a long SITE CHOWN command.
Buffer overflow in FTP server in HPUX 11 allows remote attackers to execute arbitrary commands by creating a long pathname and calling the STAT command, which uses glob to generate long strings.
Buffer overflow in ftp daemon (ftpd) 6.2 in Debian Linux allows attackers to cause a denial of service and possibly execute arbitrary code via a long SITE command.
Buffer overflow in A-FTP Anonymous FTP Server allows remote attackers to cause a denial of service via a long USER command.
Buffer overflows in CesarFTPD 0.98b allows remote attackers to execute arbitrary commands via long arguments to (1) HELP, (2) USER, (3) PASS, (4) PORT, (5) DELE, (6) REST, (7) RMD, or (8) MKD.
Buffer overflow in BlackMoon FTP Server 1.0 through 1.5 allows remote attackers to execute arbitrary code via a long argument to (1) USER, (2) PASS, or (3) CWD.
Buffer overflow in AIX ftpd in the libc library.
Buffer overflow in Serv-U FTP 2.5 allows remote users to conduct a denial of service via the SITE command.
glFtpD allows local users to gain privileges via metacharacters in the SITE ZIPCHK command.
Buffer overflow in bftp daemon (bftpd) 1.0.11 allows remote attackers to cause a denial of service and possibly execute arbitrary commands via a long USER command.
CMD overflow attempt
STAT overflow attempt
RMDIR overflow attempt
format string attempt
piss scan
saint scan
satan scan
RNFR ././ attempt
.forward
.rhosts
authorized_keys
passwd retrieval attempt
shadow retrieval attempt
ADMw0rm ftp login attempt
adm scan
iss scan
pass wh00t
invalid MODE
large PWD command
large SYST command
CWD C\:\\
EXPLOIT STAT * dos attempt
EXPLOIT STAT ? dos attempt
CWD ...
SITE CPWD overflow attempt
SITE EXEC format string attempt
Directory traversal vulnerability in FTP Serv-U before 2.5i allows remote attackers to escape the FTP root and read arbitrary files by appending a string such as "/..%20." to a CD command, a variant of a .. (dot dot) attack.
wu-ftpd 2.6.1 allows remote attackers to execute arbitrary commands via a "~{" argument to commands such as CWD, which is not properly handled by the glob function (ftpglob).
Directory traversal vulnerability in ftpd in QPC QVT/Net 4.0 and AVT/Term 5.0 allows a remote attacker to traverse directories on the web server via a "dot dot" attack in a LIST (ls) command.
Denial of service in WU-FTPD via the SITE NEWER command, which does not free memory properly.
The GNU tar command, when used in FTP sessions, may allow an attacker to execute arbitrary commands.
wu-ftp FTP server allows root access via "site exec" command.
CWD ~root command in ftpd allows root access.
Buffer overflow in 3Cdaemon 2.0 FTP server allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via long commands such as login.
autorun in Xandros based Linux distributions allows local users to read the first line of arbitrary files via the -c parameter, which causes autorun to print the first line of the file.
FTP server in Solaris 8 and earlier allows local and remote attackers to cause a core dump in the root directory, possibly with world-readable permissions, by providing a valid username with an invalid password followed by a CWD ~ command, which could release sensitive information such as shadowed passwords, or fill the disk partition.
IPS Alert Level
Low
Medium
High
Home
|
Products
|
Applications
|
Markets
|
Support
|
How to Buy
|
Channel Partners
|
Company
Comprehensive Internet Security ®
2003 SonicWALL, Inc. |
Privacy Statement