Vulnerability Description
FTPServer.py in pyftpdlib before 0.2.0 does not increment the attempted_logins count for a USER command that specifies an invalid username, which makes it easier for remote attackers to obtain access via a brute-force attack.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| G.Rodola | Pyftpdlib | <= 0.1.1 |
Related Weaknesses (CWE)
References
- http://code.google.com/p/pyftpdlib/issues/detail?id=20
- http://code.google.com/p/pyftpdlib/source/browse/trunk/HISTORY
- http://code.google.com/p/pyftpdlib/source/detail?r=23
- http://code.google.com/p/pyftpdlib/source/diff?spec=svn23&r=23&format=side&path=
- http://code.google.com/p/pyftpdlib/issues/detail?id=20
- http://code.google.com/p/pyftpdlib/source/browse/trunk/HISTORY
- http://code.google.com/p/pyftpdlib/source/detail?r=23
- http://code.google.com/p/pyftpdlib/source/diff?spec=svn23&r=23&format=side&path=
FAQ
What is CVE-2007-6737?
CVE-2007-6737 is a vulnerability with a CVSS score of 7.5 (HIGH). FTPServer.py in pyftpdlib before 0.2.0 does not increment the attempted_logins count for a USER command that specifies an invalid username, which makes it easier for remote attackers to obtain access ...
How severe is CVE-2007-6737?
CVE-2007-6737 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2007-6737?
Check the references section above for vendor advisories and patch information. Affected products include: G.Rodola Pyftpdlib.