FileZilla Server versions prior to 0.9.22 are vulnerable to remote denial of service (crash) when processing wildcard arguments to LIST/NLST commands, malformed PORT commands, or other malformed commands. This leads to NULL pointer dereference that can crash the server.
PoC代码[已公开]
id: CVE-2006-6565
info:
name: FileZilla Server < 0.9.22 - DoS via Wildcard Commands
author: pussycat0x
severity: medium
description: |
FileZilla Server versions prior to 0.9.22 are vulnerable to remote denial of service (crash) when processing wildcard arguments to LIST/NLST commands, malformed PORT commands, or other malformed commands. This leads to NULL pointer dereference that can crash the server.
reference:
- http://sourceforge.net/project/shownotes.php?release_id=470364&group_id=21558
- http://www.vupen.com/english/advisories/2006/4937
- https://exchange.xforce.ibmcloud.com/vulnerabilities/30853
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:S/C:N/I:N/A:P
cvss-score: 4
cve-id: CVE-2006-6565
cwe-id: CWE-476
epss-score: 0.66974
epss-percentile: 0.9847
cpe: cpe:2.3:a:filezilla-project:filezilla_server:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
vendor: filezilla-project
product: filezilla_server
shodan-query: product:"FileZilla"
tags: cve,cve2006,network,ftp,filezilla,tcp,passive,vuln
tcp:
- inputs:
- data: 00000000
type: hex
host:
- "{{Hostname}}"
port: 21
read-size: 1024
matchers:
- type: dsl
dsl:
- "contains(raw, 'FileZilla')"
- "compare_versions(version, '< 0.9.22')"
condition: and
extractors:
- type: regex
group: 1
name: version
regex:
- "FileZilla Server version ([0-9.]+)"
# digest: 4a0a00473045022100d6d0d83ebf51dbd8267a37ffccab82d55b560ca7a6ebe14e47f89ea77ed4b502022001f8463e9756cf89aac67b6f86365b6f47867b3352a5ed070c00d3d551cb932d:922c64590222798bb761d5b6d8e72950