| VID |
16067 |
| Severity |
40 |
| Port |
21 |
| Protocol |
TCP |
| Class |
FTP |
| Detailed Description |
The WFTPD FTP server, according to its version number, has multiple buffer overflow vulnerabilities. Texas Imperial Software WFTPD is an FTP server for Microsoft Windows operating systems. WFTPD FTP versions prior to 3.21 R2 are vulnerable to various stack-based buffer overflows and Denial of Service attacks as the followings:
1. Two stack based buffer overflow vulnerabilities could allow a remote attacker to execute arbitrary code on the remote system running the vulnerable WFTPD server software. The vulnerable FTP commands are LIST, NLST, and STAT. The attacker must be logged in as any user unless the Secure option in the registry is 0. 2. Two denial of service attacks could a remote attacker to force the WFTPD server process to use 100% of the CPU or to send a special string to crash WFTPD. To exploit these, the attacker can use a MKD or XMKD FTP command.
* Note: This check solely relied on the version number of the remote FTP server to assess this vulnerability, so this might be a false positive.
* References: http://www.securityfocus.com/archive/1/355679 http://www.securityfocus.com/archive/1/355680
* Platforms Affected: Windows Any version Texas Imperial Software WFTPD Pro Server 3.21 Release 1 (trial) (latest version) Texas Imperial Software WFTPD Pro Server 3.20 Release 2 (trial) Texas Imperial Software WFTPD Server 3.21 Release 1 (trial) (latest version) Texas Imperial Software WFTPD Server 3.10 Release 1 (trial) |
| Recommendation |
Upgrade to the latest version of WFTPD (3.21 R2 or later), available from the Texas Imperial Software Web site, Home at http://www.wftpd.com . |
| Related URL |
CVE-2004-0340,CVE-2004-0341,CVE-2004-0342 (CVE) |
| Related URL |
9767 (SecurityFocus) |
| Related URL |
(ISS) |
|