WS_FTP Pro Client ASCII Mode Directory Listing Handling Overflow

high Nessus Plugin ID 12108

Synopsis

The remote Windows host has an FTP client that is prone to a buffer overflow attack.

Description

The version of WS_FTP Pro, an FTP client, installed on the remote host is earlier than 9.0. Such versions are reportedly affected by a remote overflow triggered by an overly long string of ASCII mode directory data from a malicious server.

If an attacker can trick a user on this system to connect to a malicious FTP server using the affected application, this issue could be leveraged to execute arbitrary code subject to the user's privileges.

Solution

Upgrade to WS_FTP Pro 9.0, as that reportedly addresses the issue.

See Also

https://www.securityfocus.com/archive/1/357438/30/0/threaded

https://www.securityfocus.com/archive/1/358045/30/0/threaded

Plugin Details

Severity: High

ID: 12108

File Name: ws_ftp_client_overflows.nasl

Version: 1.17

Type: local

Agent: windows

Family: Windows

Published: 3/16/2004

Updated: 11/15/2018

Supported Sensors: Nessus Agent, Nessus

Risk Information

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 6.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:ipswitch:ws_ftp

Required KB Items: SMB/Registry/Enumerated

Exploit Ease: No known exploits are available

Vulnerability Publication Date: 3/15/2004

Reference Information

BID: 9872

Secunia: 11136