header-logo
Suggest Exploit
vendor:
CesarFTP
by:
SecurityFocus
N/A
CVSS
N/A
Resource Exhaustion
Unknown
CWE
Product Name: CesarFTP
Affected Version From: Unknown
Affected Version To: Unknown
Patch Exists: Unknown
Related CWE: Unknown
CPE: Unknown
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Unknown
Unknown

CesarFTP Remote Resource Exhaustion Vulnerability

It has been reported that CesarFTP is prone to a remote resource exhaustion vulnerability. This issue is due to the application failing to properly validate user input. Successful exploitation of this issue may cause the affected server to hang, denying service to legitimate users. It has been conjectured that this issue may be due to a boundary management problem that may lead to arbitrary code execution, however this has yet to be verified.

Mitigation:

Validate user input properly
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/9666/info

It has been reported that CesarFTP is prone to a remote resource exhaustion vulnerability. This issue is due to the application failing to properly validate user input. 

Successful exploitation of this issue may cause the affected server to hang, denying service to legitimate users. It has been conjectured that this issue may be due to a boundary management problem that may lead to arbitrary code execution, however this has yet to be verified.

ftp://www.example.com/user:pass@127.0.0.1/< ... >=4084 symbols ... >/