Synopsis
Arbitrary code can be run on the remote FTP server.
Description
This host is running a version of WS_FTP FTP server prior to 3.1.2. Versions earlier than 3.1.2 contain an unchecked buffer in routines that handle the 'CPWD' command arguments. The 'CPWD' command allows remote users to change their password. By issuing a malformed argument to the CPWD command, a user could overflow a buffer and execute arbitrary code on this host. Note that a local user account is required.
Solution
The vendor has released a patch that fixes this issue. Please install the latest patch available from the vendor's website at http://www.ipswitch.com/support/.
Plugin Details
File Name: DDI_ws_ftp-server-cpwd-bo.nasl
Supported Sensors: Nessus
Risk Information
Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P
Vulnerability Information
Exploit Ease: No known exploits are available
Vulnerability Publication Date: 8/8/2002