Short Name |
FTP:VULN:WS-FTP-5-0-4 |
---|---|
Severity |
Info |
Recommended |
No |
Category |
FTP |
Keywords |
Vulnerable Ipswitch WS_FTP Version (< 5.0.4) |
Release Date |
2005/02/02 |
Update Number |
1213 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+ |
This signature detects Ipswitch WS_FTP 5.0.3 and earlier versions. Attackers can exploit multiple vulnerabilities found in these versions to remotely run malicious code on the server.
Multiple remote buffer overflow vulnerabilities are reported in the Ipswitch WS_FTP server. These issues are due to a failure of the application to properly validate the length of user-supplied strings prior to copying them into finite process buffers. An attacker may exploit these issues to cause the affected server to crash. It is likely that execution of arbitrary code with the privileges of the user who activated the vulnerable application is also possible.