| VID |
12021 |
| Severity |
40 |
| Port |
21 |
| Protocol |
TCP |
| Class |
FTP |
| Detailed Description |
The War-FTPD daemon is vulnerable to a buffer overflow attack via USER or PASS command. War-FTPD daemon is very popular FTP server released as freeware, written for personal and professional use on Windows platform. In Some versions, a very bad buffer overflow arises due to handling the USER and PASS commands improperly. A remote attacker can issue the following commands with very long string to exploit War-FTPD daemon.
USER aaaaaa...['a'*5000]...aaaaaaaa (very long string) or PASS aaaaaa...['a'*5000]...aaaaaaaa (very long string)
It can allow the remote attacker to overflow a buffer and execute arbitrary code on the server, or crash the FTP server simply.
* Platforms Affected: War-FTPD 1.65 and earlier versions War-FTPD 1.66x3 and earlier versions
* References: http://online.securityfocus.com/archive/1/8483 http://www.iss.net/security_center/static/345.php |
| Recommendation |
Upgrade to the latest version of War-FTPD(1.70beta or later), available from the Jgaa's web site : http://support.jgaa.com Now the latest version, War-FTPD 1.81.3 version, was released on December 19, 2002. |
| Related URL |
CVE-1999-0256 (CVE) |
| Related URL |
(SecurityFocus) |
| Related URL |
(ISS) |
|