First published: Wed Aug 20 2008(Updated: )
Unspecified vulnerability in Serv-U File Server 7.0.0.1, and other versions before 7.2.0.1, allows remote authenticated users to cause a denial of service (daemon crash) via an SSH session with SFTP commands for directory creation and logging.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Solarwinds Serv-u File Server | =7.0.0.1 | |
Solarwinds Serv-u File Server | =7.0.0.2 | |
Solarwinds Serv-u File Server | =7.0.0.3 | |
Solarwinds Serv-u File Server | =7.0.0.4 | |
Solarwinds Serv-u File Server | =7.1.0.0 | |
Solarwinds Serv-u File Server | =7.1.0.1 | |
Solarwinds Serv-u File Server | =7.1.0.2 | |
Solarwinds Serv-u File Server | =7.2.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-3731 has been rated as a denial of service vulnerability, which can cause the Serv-U File Server daemon to crash.
To fix CVE-2008-3731, upgrade to Serv-U File Server version 7.2.0.1 or later.
CVE-2008-3731 affects Serv-U File Server versions 7.0.0.1 through 7.1.0.2.
Yes, CVE-2008-3731 can be exploited by remote authenticated users via an SSH session.
CVE-2008-3731 allows attackers to cause a denial of service by sending specific SFTP commands.