Korean
<< Back
VID 16030
Severity 40
Port 21
Protocol TCP
Class FTP
Detailed Description WS_FTP FTP server prior to 3.1.2 is vulnerable to a buffer overflow vulnerability.

Ipswitch WS_FTP Server, is a FTP server for Microsoft Windows platforms.
WS_FTP Server version 3.1.1 and possible other versions have a remote buffer overflow vulnerability related to the CPWD command, used to modify an authenticated user's password.
This vulnerability is caused by impropoer bounds checking of the CPWD command. By sending a oversized parameters to the CPWD command, a remote attacker can overflow a buffer and corrupt process memory, possibly leadig to the execution of arbitrary code on the server with SYSTEM privileges.

* Note : Actually this vulnerability assessment requires a local user account, but this check item solely relies on the version information of the banner.

* References:
http://online.securityfocus.com/bid/5427
http://www.iss.net/security_center/static/9794.php
Recommendation Install the latest patch available from the Ipswitch website at http://www.ipswitch.com/support/.

-- OR --

Upgrade to the latest version of WS_FTP Server (3.1.2 or later), available from the Ipswitch FTP site at ftp://ftp.ipswitch.com/ipswitch/product_support/WS_FTP_Server/ifs312.exe
Related URL CVE-2002-0826 (CVE)
Related URL (SecurityFocus)
Related URL (ISS)