FTP: Ipswitch WS_FTP Client Format String Vulnerability

This signature detects attempts to exploit a known vulnerability against Ipswitch WS_FTP client FTP product. A successful attack can allow remote code execution.

Extended Description

Ipswitch WS_FTP client is prone to a format-string vulnerability it fails to properly sanitize user-supplied input before passing it as the format specifier to a formatted-printing function. An attacker may exploit this issue to execute arbitrary code in the context of the vulnerable application. Failed exploit attempts will likely result in a denial-of-service condition. This issue affects the WS_FTP Home and WS_FTP Professional clients.

Affected Products

Ipswitch ws_ftp_pro

References

BugTraq: 30720

CVE: CVE-2008-3734

Short Name
FTP:EXPLOIT:WSFTP-FMT-STR
Severity
Minor
Recommended
False
Recommended Action
Drop
Category
FTP
Keywords
CVE-2008-3734 Client Format Ipswitch String Vulnerability WS_FTP bid:30720
Release Date
07/26/2011
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3336
False Positive
Unknown
Vendors

Ipswitch

CVSS Score

9.3

Found a potential security threat?