First published: Fri Oct 09 2009(Updated: )
Rhino Software Serv-U 7.0.0.1 through 8.2.0.3 allows remote attackers to cause a denial of service (server crash) via unspecified vectors related to the "SITE SET TRANSFERPROGRESS ON" FTP command.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Solarwinds Serv-u File Server | =7.0.0.1 | |
Solarwinds Serv-u File Server | =7.0.0.2 | |
Solarwinds Serv-u File Server | =7.0.0.3 | |
Solarwinds Serv-u File Server | =7.0.0.4 | |
Solarwinds Serv-u File Server | =7.1.0.0 | |
Solarwinds Serv-u File Server | =7.1.0.1 | |
Solarwinds Serv-u File Server | =7.1.0.2 | |
Solarwinds Serv-u File Server | =7.2.0.0 | |
Solarwinds Serv-u File Server | =7.2.0.1 | |
Solarwinds Serv-u File Server | =7.3.0.0 | |
Solarwinds Serv-u File Server | =7.3.0.1 | |
Solarwinds Serv-u File Server | =7.3.0.2 | |
Solarwinds Serv-u File Server | =7.4.0.0 | |
Solarwinds Serv-u File Server | =7.4.0.1 | |
Solarwinds Serv-u File Server | =8.0.0.1 | |
Solarwinds Serv-u File Server | =8.0.0.2 | |
Solarwinds Serv-u File Server | =8.0.0.4 | |
Solarwinds Serv-u File Server | =8.0.0.5 | |
Solarwinds Serv-u File Server | =8.0.0.7 | |
Solarwinds Serv-u File Server | =8.1.0.1 | |
Solarwinds Serv-u File Server | =8.1.0.3 | |
Solarwinds Serv-u File Server | =8.2.0.0 | |
Solarwinds Serv-u File Server | =8.2.0.1 | |
Solarwinds Serv-u File Server | =8.2.0.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-3655 has a severity rating of medium due to its potential to cause a denial of service.
To fix CVE-2009-3655, upgrade to a version of Solarwinds Serv-U File Server that is not vulnerable, such as any version beyond 8.2.0.3.
CVE-2009-3655 allows remote attackers to exploit the vulnerability to crash the server using the "SITE SET TRANSFERPROGRESS ON" FTP command.
Versions 7.0.0.1 through 8.2.0.3 of Solarwinds Serv-U File Server are affected by CVE-2009-3655.
There is no documented workaround for CVE-2009-3655, hence upgrading to a patched version is recommended.