Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

Microsoft IIS FTPd NLST stack overflow

Information

Severity

Severity

Critical

Family

Family

FTP

CVSSv2 Base

CVSSv2 Base

9.3

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:M/Au:N/C:C/I:C/A:C

Solution Type

Solution Type

Mitigation

Created

Created

14 years ago

Modified

Modified

5 years ago

Summary

Microsoft IIS FTPd NLST stack overflow The Microsoft IIS FTPd service may be vulnerable to a stack overflow via the NLST command. On Microsoft IIS 5.x this vulnerability can be used to gain remote SYSTEM level access, whilst on IIS 6.x it has been reported to result in a denial of service. Whilst it can be triggered by authenticated users with write access to the FTP server, this check determines whether anonymous users have the write access necessary to trigger it without authentication.

Solution

Solution

We are not aware of a vendor approved solution at the current time. On the following platforms, we recommend you mitigate in the described manner: Microsoft IIS 5.x Microsoft IIS 6.x We recommend you mitigate in the following manner: Filter inbound traffic to 21/tcp to only known management hosts Consider removing directories writable by 'anonymous'

Common Vulnerabilities and Exposures (CVE)