CVE-2008-4500

Solarwinds Serv-u File Server - Improper Input Validation

Title source: rule
STIX 2.1

Description

Serv-U 7.0.0.1 through 7.3, including 7.2.0.1, allows remote authenticated users to cause a denial of service (CPU consumption) via a crafted stou command, probably related to MS-DOS device names, as demonstrated using "con:1".

Exploits (1)

exploitdb WORKING POC VERIFIED
by dmnt · textdoswindows
https://www.exploit-db.com/exploits/6660

References (6)

Core 6
Core References
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/45652
Third Party Advisory vdb-entry x_refsource_vupen
http://www.vupen.com/english/advisories/2008/2746
Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/32150
Exploit, Third Party Advisory exploit x_refsource_exploit-db
https://www.exploit-db.com/exploits/6660
Third Party Advisory third-party-advisory x_refsource_sreason
http://securityreason.com/securityalert/4377
Exploit vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/31556

Scores

EPSS 0.1006
EPSS Percentile 93.1%

Details

CWE
CWE-20
Status published
Products (12)
solarwinds/serv-u_file_server 7.0.0.1
solarwinds/serv-u_file_server 7.0.0.2
solarwinds/serv-u_file_server 7.0.0.3
solarwinds/serv-u_file_server 7.0.0.4
solarwinds/serv-u_file_server 7.1.0.0
solarwinds/serv-u_file_server 7.1.0.1
solarwinds/serv-u_file_server 7.1.0.2
solarwinds/serv-u_file_server 7.2.0.0
solarwinds/serv-u_file_server 7.2.0.1
solarwinds/serv-u_file_server 7.3.0.0
... and 2 more
Published Oct 09, 2008
Tracked Since Feb 18, 2026