Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

This site is deprecated. Please CLICK HERE for latest updates

Short Name

FTP:WS-FTP:WS-FTP-COMM-OF

Severity

Major

Recommended

No

Recommended Action

Drop

Category

FTP

Keywords

Ipswitch WS_FTP Server FTP Commands Buffer Overflow

Release Date

2006/10/09

Update Number

1213

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+

FTP: Ipswitch WS_FTP Server FTP Commands Buffer Overflow


This signature detects attempts to exploit a known vulnerability in the Ipswitch FTP Server. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the vulnerable service, normally System.

Extended Description

Ipswitch WS_FTP Server is prone to a number of stack-overflow vulnerabilities. Updates are available. A successful exploit may lead to remote arbitrary code execution with administrative privileges, facilitating the complete compromise of affected computers. Ipswitch WS_FTP Server 5.04 and 5.05 are vulnerable to these issues; other versions may also be affected.

Affected Products

  • Ipswitch ws_ftp_server 5.04
  • Ipswitch ws_ftp_server 5.05

References

  • BugTraq: 20076
  • CVE: CVE-2006-4847
  • CVE: CVE-2006-5001
  • CVE: CVE-2006-5000

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out