WS_FTP Pro HTTP Server Response Format String

high Nessus Plugin ID 44046

Language:

Synopsis

The remote Windows host contains a program that is prone to a remote format string attack.

Description

The remote Windows host contains a version of Ipswitch's WS_FTP Professional that is earlier than 12.2. Such versions are prone to a format-string vulnerability because they fail to properly sanitize user-supplied input before passing it as the format specifier to a formatted-printing function.

If an attacker can trick a user into connecting to a malicious web server using the affected application, this issue could be exploited to execute arbitrary code subject to the user's privileges.

Solution

Upgrade to WS_FTP Pro for Windows version 12.2 or later.

See Also

http://www.nessus.org/u?a90721b7

Plugin Details

Severity: High

ID: 44046

File Name: wsftppro_122.nasl

Version: 1.11

Type: local

Agent: windows

Family: Windows

Published: 1/18/2010

Updated: 11/15/2018

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 7.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:ipswitch:ws_ftp

Required KB Items: SMB/Registry/Enumerated

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 11/10/2009

Vulnerability Publication Date: 9/9/2009

Reference Information

CVE: CVE-2009-4775

BID: 36297