Addonics NAS Adapter FTP Remote Denial of Service

2009-05-02 / 2009-05-03
Risk: High
Local: No
Remote: Yes
CWE: CWE-119


CVSS Base Score: 7.1/10
Impact Subscore: 6.9/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: None
Integrity impact: None
Availability impact: Complete

Remote: yes Local: no Credit: Mike Cyr, aka h00die Vulnerable: NASU2FW41 Loader 1.17 Not Vulnerable: Discussion: The FTP server included with the Addonics NAS Adapter is vulnerable to 3 remote BoF conditions which result in a DoS and requires a device reboot as the entire tcp/ip stack is crashed. Exploit: http://milw0rm.com/exploits/8584 the RMDIR, Delete, Rename functions are all vulnerable. Log: Vendor notification March 25, 2009 (ticket 497283) Vendor response March 26, 2009 Milw0rm code release April 1, 2009 Security Focus Notification April 1, 2009 References: Vendor/Product Website: http://www.addonics.com/products/nas/nasu2.asp

References:

http://xforce.iss.net/xforce/xfdb/50289
http://www.securityfocus.com/bid/34796
http://www.securityfocus.com/archive/1/archive/1/503146/100/0/threaded
http://www.milw0rm.com/exploits/8584
http://secunia.com/advisories/34965


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top