Neohapsis is currently accepting applications for employment. For more information, please visit our website www.neohapsis.com or email firstname.lastname@example.org
From: Arne Vidstrom (arne.vidstromNTSECURITY.NU)
Date: Tue Jan 29 2002 - 15:31:18 CST
There are a couple of vulnerabilities in EServ 2.97.
*** Vulnerability #1 ***
The FTP server doesn't close the sockets that are allocated from using the
PASV command. After all ports from 1024 to 5000 are listening (after running
a lot of PASV commands in a row) no users can use passive mode anymore until
the server is restarted.
This vulnerability is made even worse by the fact that the PASV command is
accepted before the user has authenticated.
*** Vulnerability #2 ***
The FTP server is vulnerable to the bounce attack. Not only does it not have
a restriction on the IP address that the data connection is opened to, but
it also does not have a restriction on the target port number at all.
*** Vendor response ***
The lastest beta version fixes these two vulnerabilities and it can be found
Download the zip file and unzip the exe file inside so it overwrites the exe
file from version 2.97.
/Arne Vidstrom, http://ntsecurity.nu
Delivery co-sponsored by Qualys - Make Your Network Secure
Go Beyond PARTIAL Security: FREE White Paper
Stop hassling with half-baked ENTERPRISE SECURITY.
FREE White Paper shows you how to ensure TOTAL security for your Internet
perimeter with the most current and most complete PROACTIVE Vulnerability
Assessment solution. Get your FREE White Paper now. Click here!