A network administrator discovers several unknown files in the root directory of his Linux FTP server. One of the files is a tarball, two are shell script files, and the third is a binary file is named `nc.` The FTP server's access logs show that the anonymous user account logged in to the server, uploaded the files, and extracted the contents of the tarball and ran the script using a function provided by the FTP server's software. The ps command shows that the nc file is running as process, and the netstat command shows the nc process is listening on a network port.
What kind of vulnerability must be present to make this remote attack possible?
ateh
Highly Voted 2 years, 9 months agoScryptic
Highly Voted 2 years, 8 months agoBeekay52
Most Recent 7 months, 1 week agoostorgaf
8 months, 2 weeks agoVincent_Lu
8 months, 3 weeks agoVincent_Lu
8 months, 3 weeks agoMK123One
10 months, 1 week agoyasso2023
1 year, 1 month agojosevirtual
1 year, 3 months agoFamous_Guy
1 year, 5 months agoantoclk
1 year, 7 months agon3wb
1 year, 10 months agoarmaan2003
1 year, 11 months agoCCLIN1014
1 year, 11 months agoCCLIN1014
1 year, 11 months agobeskardrip
2 years agojosevirtual
1 year, 3 months agon3wb
1 year, 10 months agoNovmejst
2 years, 4 months agoJC1418
2 years, 8 months agoAngelife
2 years, 9 months ago