WS_FTP Pro Client ASCII Mode Directory Listing Handling Overflow

This script is Copyright (C) 2004-2015 Tenable Network Security, Inc.


Synopsis :

The remote Windows host has an FTP client that is prone to a buffer
overflow attack.

Description :

The version of WS_FTP Pro, an FTP client, installed on the remote host
is earlier than 9.0. Such versions are reportedly affected by a remote
overflow triggered by an overly long string of ASCII mode directory
data from a malicious server.

If an attacker can trick a user on this system to connect to a
malicious FTP server using the affected application, this issue could
be leveraged to execute arbitrary code subject to the user's
privileges.

See also :

http://www.securityfocus.com/archive/1/357438/30/0/threaded
http://www.securityfocus.com/archive/1/358045/30/0/threaded

Solution :

Upgrade to WS_FTP Pro 9.0, as that reportedly addresses the issue.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 7.9
(CVSS2#E:U/RL:U/RC:ND)
Public Exploit Available : false

Family: Windows

Nessus Plugin ID: 12108 ()

Bugtraq ID: 9872

CVE ID:

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now