⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 secpod_wsftp_client_format_string_vuln_900206.nasl

📁 漏洞扫描源码,可以扫描linux,windows,交换机路由器
💻 NASL
字号:
################################################################################  Ipswitch WS FTP Client Format String Vulnerability   ##  Copyright: SecPod##  Date Written: 2008/08/26##  Revision: 1.1##  Log: veerendragg#  Issue #0143#  ------------------------------------------------------------------------#  This program was written by SecPod and is licensed under the GNU GPL #  license. Please refer to the below link for details,#  http://www.gnu.org/licenses/gpl.html#  This header contains information regarding licensing terms under the GPL, #  and information regarding obtaining source code from the Author. #  Consequently, pursuant to section 3(c) of the GPL, you must accompany the #  information found in this header with any distribution you make of this #  Program.#  ------------------------------------------------------------------------##############################################################################if(description){ script_id(900206); script_bugtraq_id(30720); script_cve_id("CVE-2008-3734"); script_copyright(english:"Copyright (C) 2008 SecPod"); script_version("Revision: 1.1 "); script_category(ACT_GATHER_INFO); script_family(english:"Denial of Service"); script_name(english:"Ipswitch WS FTP Client Format String Vulnerability"); script_summary(english:"Check for WS FTP Client version"); desc["english"] = " Overview : This host is running WS FTP Client, which is prone to Format String  Vulnerability. Vulnerability Insight :        Issue is caused due to a format string error when processing responses        of the FTP server.         Impact : Successful exploitation will allow execution of arbitrary code        on the vulnerable system or cause the application to crash by tricking        a user into connecting to a malicious ftp server. Impact Level : Application Affected Software/OS :        Ipswitch WS FTP Home/Professional 2007 and prior versions.  Fix : No solution/patch is available as on 26th August, 2008. Information regarding this issue will update once the solution details are available. For updates refer, http://www.ipswitchft.com/products/ References : http://secunia.com/advisories/31504/ http://xforce.iss.net/xforce/xfdb/44512 CVSS Score :        CVSS Base Score     : 6.8 (AV:N/AC:M/Au:NR/C:P/I:P/A:P)        CVSS Temporal Score : 6.1 Risk factor : Medium"; script_description(english:desc["english"]); script_dependencies("secpod_reg_enum.nasl"); script_require_keys("SMB/WindowsVersion"); exit(0);} include("smb_nt.inc"); include("secpod_smb_func.inc"); if(!get_kb_item("SMB/WindowsVersion")){        exit(0); } wsFtpDir = registry_get_sz(key:"SOFTWARE\Ipswitch\WS_FTP",                            item:"Dir"); if(!wsFtpDir) {        wsFtpDir = registry_get_sz(key:"SOFTWARE\Ipswitch\WS_FTP Home",                                   item:"Dir");        if(!wsFtpDir){                exit(0);        }        # Set Flag for Home edition.        wsFtpHome = TRUE; } share = ereg_replace(pattern:"([A-Z]):.*", replace:"\1$", string:wsFtpDir); file =  ereg_replace(pattern:"[A-Z]:(.*)", replace:"\1",		      string:wsFtpDir + "\wsftpgui.exe"); name    =  kb_smb_name(); login   =  kb_smb_login(); pass    =  kb_smb_password(); domain  =  kb_smb_domain(); port    =  kb_smb_transport(); if(!port){	port = 139; } if(!get_port_state(port)){	exit(0); } soc = open_sock_tcp(port); if(!soc){	exit(0); } r = smb_session_request(soc:soc, remote:name); if(!r) {        close(soc);        exit(0); } prot = smb_neg_prot(soc:soc); if(!prot) {        close(soc);        exit(0); } r = smb_session_setup(soc:soc, login:login, password:pass, domain:domain, prot:prot); if(!r) {        close(soc);        exit(0); } uid = session_extract_uid(reply:r); r = smb_tconx(soc:soc, name:name, uid:uid, share:share); tid = tconx_extract_tid(reply:r); if(!tid) {        close(soc);        exit(0); } fid = OpenAndX(socket:soc, uid:uid, tid:tid, file:file); if(!fid) {        close(soc);	exit(0); } fileVer = GetVersion(socket:soc, uid:uid, tid:tid, fid:fid, verstr:"prod"); close(soc); if(!fileVer){	exit(0); } if(wsFtpHome) {        # Grep Home Edition Version <= 2007.0.0.2        if(egrep(pattern:"^([01][0-9][0-9][0-9]\..*|200[0-6]\..*|" +                          "2007\.0\.0\.[0-2])$", string:fileVer)){                security_warning(0);        } } else {        # Grep Professional Edition Vesion <= 2007.1.0.0        if(egrep(pattern:"^([01][0-9][0-9][0-9]\..*|200[0-6]\..*|" +                          "2007\.[01]\.0\.0)$", string:fileVer)){                security_warning(0);        } }

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -