var-200802-0496
Vulnerability from variot
Buffer overflow in Ipswitch WS_FTP Server with SSH 6.1.0.0 allows remote authenticated users to cause a denial of service (crash) and possibly execute arbitrary code via a long opendir command. Ipswitch WS_FTP is prone to a buffer-overflow vulnerability because the application fails to bounds-check user-supplied data before copying it into an insufficiently sized buffer. An attacker may exploit this issue to execute arbitrary code with SYSTEM-level privileges. Successfully exploiting this issue will result in the complete compromise of affected computers. Failed exploit attempts will result in a denial of service. This issue affects WS_FTP 6.1.0.0; other versions may also be affected. Progress Software Ipswitch WS_FTP Server is a set of file transfer solutions provided by Progress Software in the United States. It provides functions such as file transfer control and transfer encryption.
A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI has been released. The new version includes many new and advanced features, which makes it even easier to stay patched.
Download and test it today: https://psi.secunia.com/
Read more about this new version: https://psi.secunia.com/?page=changelog
TITLE: IpSwitch WS_FTP Server with SSH Buffer Overflow Vulnerability
SECUNIA ADVISORY ID: SA28753
VERIFY ADVISORY: http://secunia.com/advisories/28753/
CRITICAL: Moderately critical
IMPACT: DoS, System access
WHERE:
From remote
SOFTWARE: WS_FTP Server 6.x http://secunia.com/product/14782/
DESCRIPTION: securfrog has discovered a vulnerability in IpSwitch WS_FTP Server with SSH, which can be exploited by malicious users to cause a DoS (Denial of Service) or potentially compromise a vulnerable system.
The vulnerability is caused due to a boundary error in the SSH Server Service (SSHServer.exe) when handling arguments to the "opendir" command. This can be exploited to cause a stack-based buffer overflow by passing an overly long argument to the affected command.
Successful exploitation may allow execution of arbitrary code.
The vulnerability is confirmed in IpSwitch WS_FTP Server with SSH version 6.1.
SOLUTION: Grant only trusted users access to the SSH Server Service.
PROVIDED AND/OR DISCOVERED BY: securfrog
ORIGINAL ADVISORY: http://www.milw0rm.com/exploits/5044
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200802-0496", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "ws ftp server", "scope": "eq", "trust": 1.4, "vendor": "ipswitch", "version": "6.1.0.0" }, { "model": "ws ftp server", "scope": "eq", "trust": 1.0, "vendor": "progress", "version": "6.1.0.0" }, { "model": "ws ftp server", "scope": "eq", "trust": 0.3, "vendor": "ipswitch", "version": "6.1.0" }, { "model": "ws ftp server", "scope": "ne", "trust": 0.3, "vendor": "ipswitch", "version": "6.1.1" }, { "model": "ws ftp server", "scope": "ne", "trust": 0.3, "vendor": "ipswitch", "version": "7.1" } ], "sources": [ { "db": "BID", "id": "27573" }, { "db": "JVNDB", "id": "JVNDB-2008-004031" }, { "db": "CNNVD", "id": "CNNVD-200802-066" }, { "db": "NVD", "id": "CVE-2008-0590" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:ipswitch:ws_ftp_server", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2008-004031" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "securfrog@gmail.com is credited with the discovery of this vulnerability.", "sources": [ { "db": "BID", "id": "27573" }, { "db": "CNNVD", "id": "CNNVD-200802-066" } ], "trust": 0.9 }, "cve": "CVE-2008-0590", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.0, "id": "CVE-2008-0590", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.0, "id": "VHN-30715", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:S/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2008-0590", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2008-0590", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-200802-066", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-30715", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-30715" }, { "db": "JVNDB", "id": "JVNDB-2008-004031" }, { "db": "CNNVD", "id": "CNNVD-200802-066" }, { "db": "NVD", "id": "CVE-2008-0590" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Buffer overflow in Ipswitch WS_FTP Server with SSH 6.1.0.0 allows remote authenticated users to cause a denial of service (crash) and possibly execute arbitrary code via a long opendir command. Ipswitch WS_FTP is prone to a buffer-overflow vulnerability because the application fails to bounds-check user-supplied data before copying it into an insufficiently sized buffer. \nAn attacker may exploit this issue to execute arbitrary code with SYSTEM-level privileges. Successfully exploiting this issue will result in the complete compromise of affected computers. Failed exploit attempts will result in a denial of service. \nThis issue affects WS_FTP 6.1.0.0; other versions may also be affected. Progress Software Ipswitch WS_FTP Server is a set of file transfer solutions provided by Progress Software in the United States. It provides functions such as file transfer control and transfer encryption. \n\n----------------------------------------------------------------------\n\nA new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI\nhas been released. The new version includes many new and advanced\nfeatures, which makes it even easier to stay patched. \n\nDownload and test it today:\nhttps://psi.secunia.com/\n\nRead more about this new version:\nhttps://psi.secunia.com/?page=changelog\n\n----------------------------------------------------------------------\n\nTITLE:\nIpSwitch WS_FTP Server with SSH Buffer Overflow Vulnerability\n\nSECUNIA ADVISORY ID:\nSA28753\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/28753/\n\nCRITICAL:\nModerately critical\n\nIMPACT:\nDoS, System access\n\nWHERE:\n\u003eFrom remote\n\nSOFTWARE:\nWS_FTP Server 6.x\nhttp://secunia.com/product/14782/\n\nDESCRIPTION:\nsecurfrog has discovered a vulnerability in IpSwitch WS_FTP Server\nwith SSH, which can be exploited by malicious users to cause a DoS\n(Denial of Service) or potentially compromise a vulnerable system. \n\nThe vulnerability is caused due to a boundary error in the SSH Server\nService (SSHServer.exe) when handling arguments to the \"opendir\"\ncommand. This can be exploited to cause a stack-based buffer overflow\nby passing an overly long argument to the affected command. \n\nSuccessful exploitation may allow execution of arbitrary code. \n\nThe vulnerability is confirmed in IpSwitch WS_FTP Server with SSH\nversion 6.1. \n\nSOLUTION:\nGrant only trusted users access to the SSH Server Service. \n\nPROVIDED AND/OR DISCOVERED BY:\nsecurfrog\n\nORIGINAL ADVISORY:\nhttp://www.milw0rm.com/exploits/5044\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2008-0590" }, { "db": "JVNDB", "id": "JVNDB-2008-004031" }, { "db": "BID", "id": "27573" }, { "db": "VULHUB", "id": "VHN-30715" }, { "db": "PACKETSTORM", "id": "63215" } ], "trust": 2.07 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-30715", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-30715" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2008-0590", "trust": 2.8 }, { "db": "BID", "id": "27573", "trust": 2.0 }, { "db": "SECUNIA", "id": "28753", "trust": 1.9 }, { "db": "EXPLOIT-DB", "id": "5044", "trust": 1.8 }, { "db": "VUPEN", "id": "ADV-2008-0400", "trust": 1.7 }, { "db": "SREASON", "id": "3609", "trust": 1.7 }, { "db": "JVNDB", "id": "JVNDB-2008-004031", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-200802-066", "trust": 0.7 }, { "db": "SEEBUG", "id": "SSVID-65169", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-30715", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "63215", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-30715" }, { "db": "BID", "id": "27573" }, { "db": "JVNDB", "id": "JVNDB-2008-004031" }, { "db": "PACKETSTORM", "id": "63215" }, { "db": "CNNVD", "id": "CNNVD-200802-066" }, { "db": "NVD", "id": "CVE-2008-0590" } ] }, "id": "VAR-200802-0496", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-30715" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T22:28:10.138000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "WS_FTP", "trust": 0.8, "url": "http://www.ipswitchft.com" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2008-004031" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-30715" }, { "db": "JVNDB", "id": "JVNDB-2008-004031" }, { "db": "NVD", "id": "CVE-2008-0590" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "http://www.securityfocus.com/bid/27573" }, { "trust": 1.7, "url": "http://www.securityfocus.com/archive/1/487441/100/0/threaded" }, { "trust": 1.7, "url": "https://www.exploit-db.com/exploits/5044" }, { "trust": 1.7, "url": "http://secunia.com/advisories/28753" }, { "trust": 1.7, "url": "http://securityreason.com/securityalert/3609" }, { "trust": 1.7, "url": "http://www.vupen.com/english/advisories/2008/0400/references" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-0590" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2008-0590" }, { "trust": 0.3, "url": "http://www.ipswitch.com/products/ws_ftp/home/index.asp" }, { "trust": 0.3, "url": "/archive/1/487441" }, { "trust": 0.3, "url": "http://www.ipswitchft.com/support/ws_ftp_server/releases/wr611.asp" }, { "trust": 0.1, "url": "http://secunia.com/secunia_security_advisories/" }, { "trust": 0.1, "url": "https://psi.secunia.com/?page=changelog" }, { "trust": 0.1, "url": "https://psi.secunia.com/" }, { "trust": 0.1, "url": "http://secunia.com/product/14782/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/28753/" }, { "trust": 0.1, "url": "http://www.milw0rm.com/exploits/5044" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "http://secunia.com/about_secunia_advisories/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-30715" }, { "db": "BID", "id": "27573" }, { "db": "JVNDB", "id": "JVNDB-2008-004031" }, { "db": "PACKETSTORM", "id": "63215" }, { "db": "CNNVD", "id": "CNNVD-200802-066" }, { "db": "NVD", "id": "CVE-2008-0590" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-30715" }, { "db": "BID", "id": "27573" }, { "db": "JVNDB", "id": "JVNDB-2008-004031" }, { "db": "PACKETSTORM", "id": "63215" }, { "db": "CNNVD", "id": "CNNVD-200802-066" }, { "db": "NVD", "id": "CVE-2008-0590" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2008-02-05T00:00:00", "db": "VULHUB", "id": "VHN-30715" }, { "date": "2008-02-02T00:00:00", "db": "BID", "id": "27573" }, { "date": "2012-09-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2008-004031" }, { "date": "2008-02-04T18:20:45", "db": "PACKETSTORM", "id": "63215" }, { "date": "2008-02-05T00:00:00", "db": "CNNVD", "id": "CNNVD-200802-066" }, { "date": "2008-02-05T12:00:00", "db": "NVD", "id": "CVE-2008-0590" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-08-13T00:00:00", "db": "VULHUB", "id": "VHN-30715" }, { "date": "2015-05-07T17:33:00", "db": "BID", "id": "27573" }, { "date": "2012-09-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2008-004031" }, { "date": "2020-05-11T00:00:00", "db": "CNNVD", "id": "CNNVD-200802-066" }, { "date": "2024-11-21T00:42:27.337000", "db": "NVD", "id": "CVE-2008-0590" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-200802-066" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "SSH have Ipswitch WS_FTP Server Vulnerable to buffer overflow", "sources": [ { "db": "JVNDB", "id": "JVNDB-2008-004031" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-200802-066" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.