WS_FTP LE *PASV* Response Buffer Overflow Vulnerability

Posted on Monday, September 25, 2006 @ 17:11:42 UTC in Security
by Raven

TITLE: WS_FTP LE *PASV* Response Buffer Overflow Vulnerability

SECUNIA ADVISORY ID: SA22032

VERIFY ADVISORY: http://secunia.com/advisories/22032/

CRITICAL: Moderately critical

IMPACT: DoS, System access

WHERE: >From remote

SOFTWARE: WS_FTP LE 5.x - http://secunia.com/product/12062/

DESCRIPTION: h07 has discovered a vulnerability in WS_FTP LE, which can be exploited by malicious people to compromise a vulnerable system.

The vulnerability is caused due to an error within the handling of responses to the "PASV" command. This can be exploited to cause a buffer overflow by e.g. tricking a user into connecting to a malicious FTP server. Successful exploitation allows execution of arbitrary code. The vulnerability has been confirmed in version 5.08. Other versions may also be affected.

SOLUTION: Connect to trusted FTP servers only. Use another product.

PROVIDED AND/OR DISCOVERED BY: h07
 
 
click Related        click Share
 
 
Associated Topics

Bugs


Bugs and Alerts
 
News ©

Site Info

Last SeenLast Seen
  • vashd1
  • kguske
Server TrafficServer Traffic
  • Total: 482,522,852
  • Today: 1,749
Server InfoServer Info
  • Apr 26, 2024
  • 01:11 am UTC