CVE-2006-6565: FileZilla Server < 0.9.22 - DoS via Wildcard Commands

日期: 2025-08-01 | 影响软件: FileZilla Server | POC: 已公开

漏洞描述

FileZilla Server versions prior to 0.9.22 are vulnerable to remote denial of service (crash) when processing wildcard arguments to LIST/NLST commands, malformed PORT commands, or other malformed commands. This leads to NULL pointer dereference that can crash the server.

PoC代码[已公开]

id: CVE-2006-6565

info:
  name: FileZilla Server < 0.9.22 - DoS via Wildcard Commands
  author: pussycat0x
  severity: medium
  description: |
    FileZilla Server versions prior to 0.9.22 are vulnerable to remote denial of service (crash) when processing wildcard arguments to LIST/NLST commands, malformed PORT commands, or other malformed commands. This leads to NULL pointer dereference that can crash the server.
  reference:
    - http://sourceforge.net/project/shownotes.php?release_id=470364&group_id=21558
    - http://www.vupen.com/english/advisories/2006/4937
    - https://exchange.xforce.ibmcloud.com/vulnerabilities/30853
  classification:
    cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:S/C:N/I:N/A:P
    cvss-score: 4
    cve-id: CVE-2006-6565
    cwe-id: CWE-476
    epss-score: 0.66974
    epss-percentile: 0.9847
    cpe: cpe:2.3:a:filezilla-project:filezilla_server:*:*:*:*:*:*:*:*
  metadata:
    verified: true
    max-request: 1
    vendor: filezilla-project
    product: filezilla_server
    shodan-query: product:"FileZilla"
  tags: cve,cve2006,network,ftp,filezilla,tcp,passive,vuln

tcp:
  - inputs:
      - data: 00000000
        type: hex

    host:
      - "{{Hostname}}"

    port: 21
    read-size: 1024

    matchers:
      - type: dsl
        dsl:
          - "contains(raw, 'FileZilla')"
          - "compare_versions(version, '< 0.9.22')"
        condition: and

    extractors:
      - type: regex
        group: 1
        name: version
        regex:
          - "FileZilla Server version ([0-9.]+)"
# digest: 4a0a00473045022100d6d0d83ebf51dbd8267a37ffccab82d55b560ca7a6ebe14e47f89ea77ed4b502022001f8463e9756cf89aac67b6f86365b6f47867b3352a5ed070c00d3d551cb932d:922c64590222798bb761d5b6d8e72950

相关漏洞推荐