Short Name |
FTP:WS-FTP:CPWD |
---|---|
Severity |
Minor |
Recommended |
No |
Category |
FTP |
Keywords |
WS FTP Server "SITE CPWD" Buffer Overflow |
Release Date |
2003/04/22 |
Update Number |
1213 |
Supported Platforms |
di-5.3+, idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+ |
This signature detects attempts to exploit a known vulnerability against WS FTP Server. The code that handles arguments to the SITE CPWD command, which allows users to change their password, contains an unchecked string copy. Attackers can send a maliciously crafted argument in the SITE CPWD command to overflow the buffer and overwrite the return address.
Ipswitch WS_FTP Server, is a FTP server for Microsoft Windows platforms. Ipswitch WS FTP Server contains a remote buffer overflow vulnerability related to the CPWD command, used to modify an authenticated user's password. Oversized parameters may corrupt process memory, possibly leading to the execution of arbitrary code as the server process. This issue has been reported in WS_FTP Server 3.1.1. Earlier versions may share this vulnerability, this has not however been confirmed.