VID |
16131 |
Severity |
40 |
Port |
21 |
Protocol |
TCP |
Class |
FTP |
Detailed Description |
The remote host is running a version of WS_FTP earlier than 6.1.1. Such versions are reportedly affected by multiple vulnerabilities :
- Improper handling of UDP packets within the FTP log server may allow an attacker to crash the affected service. (CVE-2008-0608) - There is a buffer overflow vulnerability in the SSH Server service that can be triggered when handling arguments to the 'opendir' command. (CVE-2008-0590) - An attacker can exploit a vulnerability in the 'FTPLogServer/LogViewer.asp' script to gain access to the log viewing interface. (CVE-2008-5692)
* References: http://www.ipswitchft.com/support/ws_ftp_server/releases/wr611.asp http://www.securityfocus.com/archive/1/487506/30/0/threaded http://www.securityfocus.com/archive/1/487441/30/0/threaded
* Platforms Affected: WS_FTP Server 6. |
Recommendation |
Upgrade to WS_FTP Server 6.1.1 or later |
Related URL |
CVE-2008-0590,CVE-2008-0608,CVE-2008-5692,CVE-2008-5693 (CVE) |
Related URL |
27573,27612,27654 (SecurityFocus) |
Related URL |
(ISS) |
|