FTP: Vulnerable Ipswitch WS_FTP Version (< 5.0.4)

This signature detects Ipswitch WS_FTP 5.0.3 and earlier versions. Attackers can exploit multiple vulnerabilities found in these versions to remotely run malicious code on the server.

Extended Description

Multiple remote buffer overflow vulnerabilities are reported in the Ipswitch WS_FTP server. These issues are due to a failure of the application to properly validate the length of user-supplied strings prior to copying them into finite process buffers. An attacker may exploit these issues to cause the affected server to crash. It is likely that execution of arbitrary code with the privileges of the user who activated the vulnerable application is also possible.

Affected Products

Ipswitch ws_ftp_server

References

BugTraq: 11772

CVE: CVE-2004-1135

Short Name
FTP:VULN:WS-FTP-5-0-4
Severity
Info
Recommended
False
Recommended Action
None
Category
FTP
Keywords
(< 5.0.4) CVE-2004-1135 Ipswitch Version Vulnerable WS_FTP bid:11772
Release Date
02/02/2005
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3375
False Positive
Rarely
Vendors

Ipswitch

CVSS Score

5.0

Found a potential security threat?