Pure-FTPd versions ≤ 1.0.18 are vulnerable to denial of service through connection limit exhaustion. The vulnerability occurs in the accept_client function when the maximum number of connections is exceeded, potentially causing the server to become unresponsive or crash.
PoC代码[已公开]
id: CVE-2004-0656
info:
name: Pure-FTPd ≤ 1.0.18 - DoS via Connection Limit Exhaustion
author: pussycat0x
severity: medium
description: |
Pure-FTPd versions ≤ 1.0.18 are vulnerable to denial of service through connection limit exhaustion. The vulnerability occurs in the accept_client function when the maximum number of connections is exceeded, potentially causing the server to become unresponsive or crash.
reference:
- http://www.pureftpd.org/
- https://exchange.xforce.ibmcloud.com/vulnerabilities/16611
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:N/I:N/A:P
cvss-score: 5
cve-id: CVE-2004-0656
epss-score: 0.00304
epss-percentile: 0.53226
cpe: cpe:2.3:a:pureftpd:pureftpd:0.96:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
vendor: pureftpd
product: pureftpd
shodan-query: product:"Pure-FTPd" version:"1.0.14"
tags: cve,cve2004,network,ftp,pure-ftpd,tcp,passive,vuln
tcp:
- inputs:
- data: 00000000
type: hex
host:
- "{{Hostname}}"
port: 21
read-size: 1024
matchers:
- type: dsl
dsl:
- "contains(raw, 'Pure-FTPd')"
- "compare_versions(version, '<= 1.0.18')"
condition: and
extractors:
- type: regex
group: 1
name: version
regex:
- "Pure-FTPd ([0-9.]+)"
# digest: 490a004630440220655d5d1f21fac9d3d9672a27b2ca6b7c9c9538e0fc6f9b4c8b90a50095f80b9602202570708a86553b35b14e6a6f05c28c4a04e4510119aedf0434d8bf6b5f5c4223:922c64590222798bb761d5b6d8e72950