WS_FTP < 3.1.2 SITE CPWD Buffer Overflow

high Nessus Network Monitor Plugin ID 1832

Synopsis

The remote host is vulnerable to a buffer overflow.

Description

This host is running a version of WS_FTP FTP server prior to 3.1.2. Versions earlier than 3.1.2 contain an unchecked buffer in routines that handle the 'CPWD' command arguments. The 'CPWD' command allows remote users to change their password. By issuing a malformed argument to the CPWD command, a user could overflow a buffer and execute arbitrary code on this host. Note that a local user account is required.

Solution

Upgrade to version 3.1.2 or higher.

See Also

http://www.ipswitch.com/support

Plugin Details

Severity: High

ID: 1832

Family: FTP Servers

Published: 8/20/2004

Updated: 3/6/2019

Nessus ID: 11098

Risk Information

VPR

Risk Factor: Medium

Score: 6.6

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS v3

Risk Factor: High

Base Score: 7.3

Temporal Score: 6.4

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:ipswitch:ws_ftp_server

Reference Information

CVE: CVE-2002-0826

BID: 5427