CVE-2006-2173: FileZilla FTP Server 2.2.22 - Buffer Overflow

日期: 2025-08-01 | 影响软件: FileZilla FTP Server | POC: 已公开

漏洞描述

FileZilla FTP Server version 2.2.22 contains a buffer overflow vulnerability that allows remote authenticated attackers to cause denial of service and potentially execute arbitrary code. The vulnerability can be triggered by sending excessively long PORT or PASS commands followed by MLSD commands, or through the remote interface.

PoC代码[已公开]

id: CVE-2006-2173

info:
  name: FileZilla FTP Server 2.2.22 - Buffer Overflow
  author: pussycat0x
  severity: medium
  description: |
    FileZilla FTP Server version 2.2.22 contains a buffer overflow vulnerability that allows remote authenticated attackers to cause denial of service and potentially execute arbitrary code. The vulnerability can be triggered by sending excessively long PORT or PASS commands followed by MLSD commands, or through the remote interface.
  reference:
    - http://marc.info/?l=bugtraq&m=114658586018818&w=2
    - http://www.infigo.hr/hr/in_focus/advisories/INFIGO-2006-05-03
    - https://exchange.xforce.ibmcloud.com/vulnerabilities/26303
  classification:
    cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:N/I:P/A:P
    cvss-score: 6.4
    cve-id: CVE-2006-2173
    epss-score: 0.00263
    epss-percentile: 0.49535
    cpe: cpe:2.3:a:filezilla:filezilla_server:*:*:*:*:*:*:*:*
  metadata:
    verified: true
    max-request: 1
    vendor: filezilla
    product: filezilla_server
    shodan-query: product:"FileZilla"
  tags: cve,cve2006,network,ftp,filezilla,tcp,passive,buffer-overflow,vuln

tcp:
  - inputs:
      - data: 00000000
        type: hex

    host:
      - "{{Hostname}}"

    port: 21
    read-size: 1024

    matchers:
      - type: dsl
        dsl:
          - "contains(raw, 'FileZilla')"
          - "contains(version, '2.2.22')"
        condition: and

    extractors:
      - type: regex
        group: 1
        name: version
        regex:
          - "FileZilla Server version ([0-9.]+)"
# digest: 4a0a00473045022027bc9103d57379d8a66b676c8dc349090733ffa37a83678149c69a17222d9cd1022100e6c328070df3ad96f558af94efb65903e5c8ba1b5c6ffd29cc23b96067aa9a63:922c64590222798bb761d5b6d8e72950