var-200609-0490
Vulnerability from variot
Buffer overflow in Ipswitch WS_FTP Limited Edition (LE) 5.08 allows remote FTP servers to execute arbitrary code via a long response to a PASV command. Successfully exploiting this issue will result in the complete compromise of affected computers. Failed exploit attempts will result in a denial of service. A remote buffer-overflow vulnerability is reported in the Ipswitch WS_FTP client. This issue occurs because the application fails to properly validate the length of user-supplied strings prior to copying them into finite process buffers. An attacker may exploit this issue to cause the affected client to crash. Execution of arbitrary code in the context of the FTP client process may also be possible. Version 5.08 of the affected software is vulnerable; other versions may be affected as well. Ipswitch WS_FTP Server is an FTP service program suitable for Windows systems. WS_FTP Server has a buffer overflow vulnerability when processing the registered super long SITE command locally. Local attackers may use this vulnerability to elevate their privileges.
Want to work within IT-Security?
Secunia is expanding its team of highly skilled security experts. We will help with relocation and obtaining a work permit.
Currently the following type of positions are available: http://secunia.com/quality_assurance_analyst/ http://secunia.com/web_application_security_specialist/ http://secunia.com/hardcore_disassembler_and_reverse_engineer/
TITLE: WS_FTP LE "PASV" Response Buffer Overflow Vulnerability
SECUNIA ADVISORY ID: SA22032
VERIFY ADVISORY: http://secunia.com/advisories/22032/
CRITICAL: Moderately critical
IMPACT: DoS, System access
WHERE:
From remote
SOFTWARE: WS_FTP LE 5.x http://secunia.com/product/12062/
DESCRIPTION: h07 has discovered a vulnerability in WS_FTP LE, which can be exploited by malicious people to compromise a vulnerable system.
The vulnerability is caused due to an error within the handling of responses to the "PASV" command. This can be exploited to cause a buffer overflow by e.g. tricking a user into connecting to a malicious FTP server.
SOLUTION: Connect to trusted FTP servers only.
Use another product.
PROVIDED AND/OR DISCOVERED BY: h07
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200609-0490", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "ws ftp server", "scope": "eq", "trust": 1.6, "vendor": "ipswitch", "version": "5.08_limited_edition" }, { "model": "ws ftp server", "scope": "eq", "trust": 0.8, "vendor": "ipswitch", "version": "limited edition 5.08" }, { "model": "ws ftp server", "scope": "eq", "trust": 0.3, "vendor": "ipswitch", "version": "5.05" }, { "model": "ws ftp server", "scope": "eq", "trust": 0.3, "vendor": "ipswitch", "version": "5.08" } ], "sources": [ { "db": "BID", "id": "23260" }, { "db": "BID", "id": "20121" }, { "db": "JVNDB", "id": "JVNDB-2006-002158" }, { "db": "CNNVD", "id": "CNNVD-200609-412" }, { "db": "NVD", "id": "CVE-2006-4974" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:ipswitch:ws_ftp_server", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2006-002158" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Marsu Marsupilamipowa@hotmail.fr", "sources": [ { "db": "CNNVD", "id": "CNNVD-200609-412" } ], "trust": 0.6 }, "cve": "CVE-2006-4974", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2006-4974", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-21082", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2006-4974", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2006-4974", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-200609-412", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-21082", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-21082" }, { "db": "JVNDB", "id": "JVNDB-2006-002158" }, { "db": "CNNVD", "id": "CNNVD-200609-412" }, { "db": "NVD", "id": "CVE-2006-4974" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Buffer overflow in Ipswitch WS_FTP Limited Edition (LE) 5.08 allows remote FTP servers to execute arbitrary code via a long response to a PASV command. Successfully exploiting this issue will result in the complete compromise of affected computers. Failed exploit attempts will result in a denial of service. A remote buffer-overflow vulnerability is reported in the Ipswitch WS_FTP client. This issue occurs because the application fails to properly validate the length of user-supplied strings prior to copying them into finite process buffers. \nAn attacker may exploit this issue to cause the affected client to crash. Execution of arbitrary code in the context of the FTP client process may also be possible. \nVersion 5.08 of the affected software is vulnerable; other versions may be affected as well. Ipswitch WS_FTP Server is an FTP service program suitable for Windows systems. WS_FTP Server has a buffer overflow vulnerability when processing the registered super long SITE command locally. Local attackers may use this vulnerability to elevate their privileges. \n\n----------------------------------------------------------------------\n\nWant to work within IT-Security?\n\nSecunia is expanding its team of highly skilled security experts. \nWe will help with relocation and obtaining a work permit. \n\nCurrently the following type of positions are available:\nhttp://secunia.com/quality_assurance_analyst/\nhttp://secunia.com/web_application_security_specialist/ \nhttp://secunia.com/hardcore_disassembler_and_reverse_engineer/\n\n----------------------------------------------------------------------\n\nTITLE:\nWS_FTP LE \"PASV\" Response Buffer Overflow Vulnerability\n\nSECUNIA ADVISORY ID:\nSA22032\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/22032/\n\nCRITICAL:\nModerately critical\n\nIMPACT:\nDoS, System access\n\nWHERE:\n\u003eFrom remote\n\nSOFTWARE:\nWS_FTP LE 5.x\nhttp://secunia.com/product/12062/\n\nDESCRIPTION:\nh07 has discovered a vulnerability in WS_FTP LE, which can be\nexploited by malicious people to compromise a vulnerable system. \n\nThe vulnerability is caused due to an error within the handling of\nresponses to the \"PASV\" command. This can be exploited to cause a\nbuffer overflow by e.g. tricking a user into connecting to a\nmalicious FTP server. \n\nSOLUTION:\nConnect to trusted FTP servers only. \n\nUse another product. \n\nPROVIDED AND/OR DISCOVERED BY:\nh07\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2006-4974" }, { "db": "JVNDB", "id": "JVNDB-2006-002158" }, { "db": "BID", "id": "23260" }, { "db": "BID", "id": "20121" }, { "db": "VULHUB", "id": "VHN-21082" }, { "db": "PACKETSTORM", "id": "50260" } ], "trust": 2.34 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-21082", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-21082" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2006-4974", "trust": 2.8 }, { "db": "BID", "id": "20121", "trust": 2.0 }, { "db": "SECUNIA", "id": "22032", "trust": 1.8 }, { "db": "OSVDB", "id": "29125", "trust": 1.7 }, { "db": "EXPLOIT-DB", "id": "2401", "trust": 1.7 }, { "db": "JVNDB", "id": "JVNDB-2006-002158", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-200609-412", "trust": 0.7 }, { "db": "MILW0RM", "id": "2401", "trust": 0.6 }, { "db": "XF", "id": "29074", "trust": 0.6 }, { "db": "BID", "id": "23260", "trust": 0.4 }, { "db": "VULHUB", "id": "VHN-21082", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "50260", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-21082" }, { "db": "BID", "id": "23260" }, { "db": "BID", "id": "20121" }, { "db": "JVNDB", "id": "JVNDB-2006-002158" }, { "db": "PACKETSTORM", "id": "50260" }, { "db": "CNNVD", "id": "CNNVD-200609-412" }, { "db": "NVD", "id": "CVE-2006-4974" } ] }, "id": "VAR-200609-0490", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-21082" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T22:10:06.759000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "WS_FTP", "trust": 0.8, "url": "http://www.ipswitchft.com/" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2006-002158" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2006-4974" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "http://www.securityfocus.com/bid/20121" }, { "trust": 1.7, "url": "http://www.osvdb.org/29125" }, { "trust": 1.7, "url": "http://secunia.com/advisories/22032" }, { "trust": 1.1, "url": "https://www.exploit-db.com/exploits/2401" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29074" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-4974" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2006-4974" }, { "trust": 0.6, "url": "http://www.ipswitch.com/products/ws_ftp/home/index.asp" }, { "trust": 0.6, "url": "http://www.milw0rm.com/exploits/2401" }, { "trust": 0.6, "url": "http://xforce.iss.net/xforce/xfdb/29074" }, { "trust": 0.6, "url": "http://milw0rm.com/exploits/2401" }, { "trust": 0.1, "url": "http://secunia.com/advisories/22032/" }, { "trust": 0.1, "url": "http://secunia.com/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/quality_assurance_analyst/" }, { "trust": 0.1, "url": "http://secunia.com/product/12062/" }, { "trust": 0.1, "url": "http://secunia.com/hardcore_disassembler_and_reverse_engineer/" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "http://secunia.com/web_application_security_specialist/" }, { "trust": 0.1, "url": "http://secunia.com/about_secunia_advisories/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-21082" }, { "db": "BID", "id": "23260" }, { "db": "BID", "id": "20121" }, { "db": "JVNDB", "id": "JVNDB-2006-002158" }, { "db": "PACKETSTORM", "id": "50260" }, { "db": "CNNVD", "id": "CNNVD-200609-412" }, { "db": "NVD", "id": "CVE-2006-4974" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-21082" }, { "db": "BID", "id": "23260" }, { "db": "BID", "id": "20121" }, { "db": "JVNDB", "id": "JVNDB-2006-002158" }, { "db": "PACKETSTORM", "id": "50260" }, { "db": "CNNVD", "id": "CNNVD-200609-412" }, { "db": "NVD", "id": "CVE-2006-4974" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2006-09-25T00:00:00", "db": "VULHUB", "id": "VHN-21082" }, { "date": "2007-04-02T00:00:00", "db": "BID", "id": "23260" }, { "date": "2006-09-20T00:00:00", "db": "BID", "id": "20121" }, { "date": "2012-09-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2006-002158" }, { "date": "2006-09-26T19:26:53", "db": "PACKETSTORM", "id": "50260" }, { "date": "2006-09-24T00:00:00", "db": "CNNVD", "id": "CNNVD-200609-412" }, { "date": "2006-09-25T01:07:00", "db": "NVD", "id": "CVE-2006-4974" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-10-19T00:00:00", "db": "VULHUB", "id": "VHN-21082" }, { "date": "2007-04-03T18:22:00", "db": "BID", "id": "23260" }, { "date": "2007-01-15T17:30:00", "db": "BID", "id": "20121" }, { "date": "2012-09-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2006-002158" }, { "date": "2006-09-26T00:00:00", "db": "CNNVD", "id": "CNNVD-200609-412" }, { "date": "2024-11-21T00:17:21.157000", "db": "NVD", "id": "CVE-2006-4974" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-200609-412" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Ipswitch WS_FTP LE Vulnerable to buffer overflow", "sources": [ { "db": "JVNDB", "id": "JVNDB-2006-002158" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Boundary Condition Error", "sources": [ { "db": "BID", "id": "23260" }, { "db": "BID", "id": "20121" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.