CVE-ID

CVE-2001-1109

• Severity Rating • Fix Information • Vulnerable Software Versions • SCAP Mappings
Description
Directory traversal vulnerability in EFTP 2.0.7.337 allows remote authenticated users to reveal directory contents via a .. (dot dot) in the (1) LIST, (2) QUOTE SIZE, and (3) QUOTE MDTM commands.
References
Note: References are provided for the convenience of the reader to help distinguish between vulnerabilities. The list is not intended to be complete.
Date Entry Created
20020315 Disclaimer: The entry creation date may reflect when the CVE-ID was allocated or reserved, and does not necessarily indicate when this vulnerability was discovered, shared with the affected vendor, publicly disclosed, or updated in CVE.
Phase (Legacy)
Proposed (20020315)
Votes (Legacy)
ACCEPT(3) Baker, Frech, Green
NOOP(5) Armstrong, Cole, Foat, Wall, Ziese
Comments (Legacy)
 Baker> Apparently vendor acknowledgement of the directory problems in the
   release history, located at:
   http://www.eftp.org/releasehistory.html
   2.0.8.345  2001.12.04
   Fixed a problem where the server would give a GPF whn disconnecting a single user
   Added Ratios Feature
   Added Statistics Feature
   Modified User/Group Administration - now much more stable
   Modified Startup Logo
   Modifed all data files to .ini files for easy editing and to save space
   Added Feature to save/load queues
   Added auto reconnect feature on timeout
   Fully Implemented RSA Control Port encryption, so now even commands like USER, PASS, GET, REST etc are encrypted. Total security on both data and commands.
   Added Idle Timout for the Server component
   Fixed some security flaws with directory listings

Proposed (Legacy)
20020315
This is an entry on the CVE list, which standardizes names for security problems.