ID

VAR-200605-0499


CVE

CVE-2006-2226


TITLE

XM Easy Personal FTP Server Buffer Overflow Vulnerability

Trust: 1.2

sources: CNVD: CNVD-2006-2919 // CNNVD: CNNVD-200605-096

DESCRIPTION

Buffer overflow in XM Easy Personal FTP Server 4.2 and 5.0.1 allows remote authenticated users to cause a denial of service via a long argument to the PORT command. A buffer may be overrun with attacker-supplied data. Exploiting this issue allows remote attackers to execute arbitrary machine code in the context of the ftp server application. Failed exploit attempts will likely crash applications, denying service to legitimate users. ---------------------------------------------------------------------- Secunia Survey Secunia would like to invite you to participate in an electronic survey evolving the usefulness of our mailing lists. To value your effort Secunia will offer you free access to the Secunia Security Manager for three months as well as have a prize draw for an iPod nano. We hope that you will give us a few minutes of your time, as your response will help us provide you with better services in the future. The questionnaire contains 19 questions and it takes approximately 5 minutes to answer the questionnaire. https://ca.secunia.com/survey/?survey_url=kei933wBid2 The survey is being conducted in accordance with the general Secunia Security Policy and your answers will of course be kept strictly confidential. The vulnerability is caused due to a boundary error within the handling of the USER command. This can be exploited to cause a heap-based buffer overflow via overly long arguments passed to the command. The vulnerability has been confirmed in version 4.3. Prior versions may also be affected. SOLUTION: Filter malicious requests in a proxy or firewall with FTP filtering capabilities. PROVIDED AND/OR DISCOVERED BY: Muhammad Ahmed Siddiqui ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.52

sources: NVD: CVE-2006-2226 // JVNDB: JVNDB-2006-003980 // CNVD: CNVD-2006-2919 // BID: 18711 // PACKETSTORM: 46042

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2006-2919

AFFECTED PRODUCTS

vendor:dxmsoftmodel:xm easy personal ftp serverscope:eqversion:5.0.1

Trust: 1.6

vendor:dxmsoftmodel:xm easy personal ftp serverscope:eqversion:4.2

Trust: 1.6

vendor:dxmsoftmodel:xm easy personal ftp serverscope:eqversion:4.2 and 5.0.1

Trust: 0.8

vendor:xmmodel:easy personal ftp server dxmsoftscope:eqversion:5.0.1

Trust: 0.6

vendor:xmmodel:easy personal ftp server dxmsoftscope:eqversion:4.2

Trust: 0.6

vendor:xmmodel:easy personal ftp serverscope:eqversion:5.0.1

Trust: 0.3

vendor:xmmodel:easy personal ftp serverscope:eqversion:5.2.1

Trust: 0.3

sources: CNVD: CNVD-2006-2919 // BID: 18711 // JVNDB: JVNDB-2006-003980 // CNNVD: CNNVD-200605-096 // NVD: CVE-2006-2226

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2006-2226
value: MEDIUM

Trust: 1.0

NVD: CVE-2006-2226
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2006-2919
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-200605-096
value: MEDIUM

Trust: 0.6

nvd@nist.gov: CVE-2006-2226
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2006-2919
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

sources: CNVD: CNVD-2006-2919 // JVNDB: JVNDB-2006-003980 // CNNVD: CNNVD-200605-096 // NVD: CVE-2006-2226

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2006-2226

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200605-096

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-200605-096

CONFIGURATIONS

sources: JVNDB: JVNDB-2006-003980

EXTERNAL IDS

db:NVDid:CVE-2006-2226

Trust: 3.3

db:BIDid:18711

Trust: 2.5

db:SECUNIAid:19970

Trust: 1.7

db:EXPLOIT-DBid:1552

Trust: 1.6

db:JVNDBid:JVNDB-2006-003980

Trust: 0.8

db:CNVDid:CNVD-2006-2919

Trust: 0.6

db:MILW0RMid:1552

Trust: 0.6

db:CNNVDid:CNNVD-200605-096

Trust: 0.6

db:PACKETSTORMid:46042

Trust: 0.1

sources: CNVD: CNVD-2006-2919 // BID: 18711 // JVNDB: JVNDB-2006-003980 // PACKETSTORM: 46042 // CNNVD: CNNVD-200605-096 // NVD: CVE-2006-2226

REFERENCES

url:http://www.securityfocus.com/bid/18711

Trust: 2.2

url:http://www.packetstormsecurity.org/0606-exploits/xmepftp.txt

Trust: 1.9

url:http://secunia.com/advisories/19970

Trust: 1.6

url:https://www.exploit-db.com/exploits/1552

Trust: 1.0

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-2226

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2006-2226

Trust: 0.8

url:http://www.milw0rm.com/exploits/1552

Trust: 0.6

url:http://milw0rm.com/exploits/1552

Trust: 0.6

url:http://www.dxm2008.com/

Trust: 0.3

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/advisories/19970/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/product/9760/

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:https://ca.secunia.com/survey/?survey_url=kei933wbid2

Trust: 0.1

sources: CNVD: CNVD-2006-2919 // BID: 18711 // JVNDB: JVNDB-2006-003980 // PACKETSTORM: 46042 // CNNVD: CNNVD-200605-096 // NVD: CVE-2006-2226

CREDITS

Jerome Athias is credited with the discovery of this vulnerability.

Trust: 0.9

sources: BID: 18711 // CNNVD: CNNVD-200605-096

SOURCES

db:CNVDid:CNVD-2006-2919
db:BIDid:18711
db:JVNDBid:JVNDB-2006-003980
db:PACKETSTORMid:46042
db:CNNVDid:CNNVD-200605-096
db:NVDid:CVE-2006-2226

LAST UPDATE DATE

2024-08-14T14:29:13.358000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2006-2919date:2006-05-05T00:00:00
db:BIDid:18711date:2016-07-06T14:40:00
db:JVNDBid:JVNDB-2006-003980date:2014-03-11T00:00:00
db:CNNVDid:CNNVD-200605-096date:2006-11-13T00:00:00
db:NVDid:CVE-2006-2226date:2017-10-19T01:29:07.127

SOURCES RELEASE DATE

db:CNVDid:CNVD-2006-2919date:2006-05-05T00:00:00
db:BIDid:18711date:2006-06-28T00:00:00
db:JVNDBid:JVNDB-2006-003980date:2014-03-11T00:00:00
db:PACKETSTORMid:46042date:2006-05-05T09:54:58
db:CNNVDid:CNNVD-200605-096date:2006-05-05T00:00:00
db:NVDid:CVE-2006-2226date:2006-05-05T19:02:00