Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:11921
HistoryMar 23, 2006 - 12:00 a.m.

[SA19338] Baby FTP Server File Enumeration Weakness

2006-03-2300:00:00
vulners.com
10

TITLE:
Baby FTP Server File Enumeration Weakness

SECUNIA ADVISORY ID:
SA19338

VERIFY ADVISORY:
http://secunia.com/advisories/19338/

CRITICAL:
Not critical

IMPACT:
Exposure of system information

WHERE:
>From remote

SOFTWARE:
Baby FTP Server 1.x
http://secunia.com/product/1626/

DESCRIPTION:
Ziv Kamir has discovered a weakness in Baby FTP Server, which can be
exploited by malicious people to enumerate files on an affected
system.

The weakness is caused due to the FTP server returning different
error messages depending on whether a file exists outside the FTP
root directory or not. This can be exploited via directory traversal
attacks to determine the existence of certain files.

The weakness has been confirmed in version 1.24. Other versions may
also be affected.

SOLUTION:
Use the product only when connected to trusted networks.

PROVIDED AND/OR DISCOVERED BY:
Ziv Kamir


About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/

Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.