Rapid7 Vulnerability & Exploit Database

AIX 5.3.9 - ftpd_advisory : AIX_ftpd_buffer_overflow_vulnerability (IZ83252)

Free InsightVM Trial No credit card necessary
Watch Demo See how it all works
Back to Search

AIX 5.3.9 - ftpd_advisory : AIX_ftpd_buffer_overflow_vulnerability (IZ83252)

Severity
4
CVSS
(AV:L/AC:M/Au:N/C:P/I:P/A:P)
Published
08/25/2010
Created
07/25/2018
Added
10/02/2014
Modified
10/02/2014

Description

There is a buffer overflow vulnerability in the ftp server. By issuing an overly long NLST command, an attacker may cause a buffer overflow. The successful exploitation of this vulnerability allows a remote attacker to get the DES encrypted user hashes off the server if FTP is configured to allow write access using Anonymous account or another account that is available to the attacker. The following executable is vulnerable: /usr/sbin/ftpd Please see the following for more information: http://www.exploit-db.com/exploits/14456/ http://www.exploit-db.com/exploits/14409/

Solution(s)

  • aix-5.3.9-aix_ftpd_buffer_overflow_vulnerability_ftpd_advisory

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;