Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

FTP:VULN:WS-FTP-5-0-4

Severity

Info

Recommended

No

Category

FTP

Keywords

Vulnerable Ipswitch WS_FTP Version (< 5.0.4)

Release Date

2005/02/02

Update Number

1213

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

FTP: Vulnerable Ipswitch WS_FTP Version (< 5.0.4)


This signature detects Ipswitch WS_FTP 5.0.3 and earlier versions. Attackers can exploit multiple vulnerabilities found in these versions to remotely run malicious code on the server.

Extended Description

Multiple remote buffer overflow vulnerabilities are reported in the Ipswitch WS_FTP server. These issues are due to a failure of the application to properly validate the length of user-supplied strings prior to copying them into finite process buffers. An attacker may exploit these issues to cause the affected server to crash. It is likely that execution of arbitrary code with the privileges of the user who activated the vulnerable application is also possible.

Affected Products

  • Ipswitch WS FTP Server 5.0.3

References

  • BugTraq: 11772
  • CVE: CVE-2004-1135

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out