Korean
<< Back
VID 12020
Severity 40
Port 21
Protocol TCP
Class FTP
Detailed Description The WFTPD is vulnerable to a buffer overflow attack via the conjunction of MKD and CWD commands.
WFTPD is a popular standard FTP service for Windows NT/2000/XP. Some versions of WFTPD contains a remote buffer overflow vulnerability, arises when a remote attacker sends the conjunction of two large commands the MKD and CWD, with an argument a string exact of 255 characters as the fallow :

MKD aaaaa...['a'*300]...aaaaaaaa
CWD aaaaa...['a'*300]...aaaaaaaa

It can overrun the buffer and cause a denial of service on the FTP server. Also, in the worst case, it allows a remote attacker to gain root access and to execute arbitrary code on the server.

* Platforms Affected :
Texas Imperial Software WFTPD 2.34
Texas Imperial Software WFTPD 2.40
Texas Imperial Software WFTPD 3.0

* References:
http://online.securityfocus.com/bid/747
http://www.iss.net/security_center/static/3417.php
Recommendation Restrict the user to his home directory and below.

1. Open the Security->User Rights from the menu.
2. Choose user (anonymous)
3. Check "Restrict To Home Directory And Below" on the User/Rights Security Dialog windows

-- OR --

Upgrade to WFTPD 3.0R3 or later, available from Texas Imperial Software web site : http://www.wftpd.com/downloads.htm. Now the latest version, WFTPD Pro 3.20 Release 2 version, was released on October 17, 2002.
Related URL CVE-1999-0950 (CVE)
Related URL (SecurityFocus)
Related URL (ISS)