Overview
A buffer overflow in the Ability Server may allow remote authenticated attackers to execute arbitrary code.
Description
A lack of input validation in Ability Server's FTP STOR command may allow a buffer overflow to occur. A remote authenticated attacker may be able to exploit this vulnerability by supplying the Ability Server with a specially crafted FTP STOR command. According to reports, Ability Server versions 2.34, 2.25. and 2.32 are vulnerable. However, other versions may also be affected. |
Impact
A remote authenticated attacker may be able to execute arbitrary code with the privileges of the Ability Server process or cause a denial-of-service condition. |
Solution
We are currently unaware of a practical solution to this problem. |
Block or Restrict Access Upgrade The Ability Server has been discontinued. Ability Server users are encouraged to upgrade to the Ability FTP Server to correct this issue. |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
Acknowledgements
This vulnerability was publicly reported in a Security Tracker Advisory.Security Tracker credits K-Otik with providing information regarding this issue.
This document was written by Jeff Gennari.
Other Information
CVE IDs: | None |
Severity Metric: | 12.94 |
Date Public: | 2004-10-21 |
Date First Published: | 2004-12-22 |
Date Last Updated: | 2004-12-22 19:54 UTC |
Document Revision: | 70 |