vendor:
Net::FTP
by:
Anonymous
7,5
CVSS
HIGH
Buffer Overflow
119
CWE
Product Name: Net::FTP
Affected Version From: Net::FTP 6/4/2006
Affected Version To: Net::FTP 6/4/2006
Patch Exists: YES
Related CWE: CVE-2006-4343
CPE: a:net_ftp:net_ftp
Metasploit:
https://www.rapid7.com/db/vulnerabilities/sunpatch-126254/, https://www.rapid7.com/db/vulnerabilities/sunpatch-125197/, https://www.rapid7.com/db/vulnerabilities/sunpatch-125196/, https://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2006-4343/, https://www.rapid7.com/db/vulnerabilities/f5-big-ip-cve-2006-3738/, https://www.rapid7.com/db/vulnerabilities/http-openssl-get-server-hello-dos/, https://www.rapid7.com/db/vulnerabilities/f5-big-ip-cve-2006-2937/, https://www.rapid7.com/db/vulnerabilities/f5-big-ip-cve-2006-4343/, https://www.rapid7.com/db/vulnerabilities/f5-big-ip-cve-2006-2940/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2008-0629/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2008-0525/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2006-4343/, https://www.rapid7.com/db/vulnerabilities/apple-osx-openssl-cve-2006-4343/, https://www.rapid7.com/db/vulnerabilities/oracle_linux-cve-2006-4343/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-CESA-2006-0695/, https://www.rapid7.com/db/vulnerabilities/hpsmh-cve-2006-4343/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2008-0264/, https://www.rapid7.com/db/vulnerabilities/vmsa-2008-0005-cve-2006-4343-player/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2006-0695/, https://www.rapid7.com/db/vulnerabilities/vmsa-2008-0005-cve-2006-4343-workstation/, https://www.rapid7.com/db/?q=CVE-2006-4343&type=&page=2, https://www.rapid7.com/db/?q=CVE-2006-4343&type=&page=2
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows
2006
Net::FTP Remote Buffer Overflow
This exploit is a buffer overflow vulnerability in the Net::FTP module. It allows an attacker to execute arbitrary code on the target system by sending a maliciously crafted FTP request. The vulnerability is caused by a lack of bounds checking when handling FTP requests, which allows an attacker to overflow the buffer and execute arbitrary code.
Mitigation:
The vulnerability can be mitigated by applying the latest security patches and ensuring that all FTP requests are properly validated.