Synopsis
The remote FTP server has a buffer overflow vulnerability.
Description
According to its banner, the version of WS_FTP running on the remote host has a buffer overflow vulnerability. Sending a 'STAT' command followed by a very long argument results in a buffer overflow. A remote attacker could exploit this to execute arbitrary code.
Solution
Upgrade to the latest version of WS_FTP.
Plugin Details
File Name: wsftp_stat_buf_overflow.nasl
Supported Sensors: Nessus
Vulnerability Information
Exploit Ease: Exploits are available
Reference Information
BID: 3507