WS_FTP Pro Client ASCII Mode Directory Listing Handling Overflow

High Nessus Plugin ID 12108


The remote Windows host has an FTP client that is prone to a buffer overflow attack.


The version of WS_FTP Pro, an FTP client, installed on the remote host is earlier than 9.0. Such versions are reportedly affected by a remote overflow triggered by an overly long string of ASCII mode directory data from a malicious server.

If an attacker can trick a user on this system to connect to a malicious FTP server using the affected application, this issue could be leveraged to execute arbitrary code subject to the user's privileges.


Upgrade to WS_FTP Pro 9.0, as that reportedly addresses the issue.

See Also

Plugin Details

Severity: High

ID: 12108

File Name: ws_ftp_client_overflows.nasl

Version: $Revision: 1.14 $

Type: local

Agent: windows

Family: Windows

Published: 2004/03/16

Modified: 2015/01/12

Dependencies: 13855

Risk Information

Risk Factor: High


Base Score: 9.3

Temporal Score: 7.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:U/RL:U/RC:ND

Vulnerability Information

CPE: cpe:/a:ipswitch:ws_ftp

Required KB Items: SMB/Registry/Enumerated

Exploit Available: false

Exploit Ease: No known exploits are available

Vulnerability Publication Date: 2004/03/15

Reference Information

BID: 9872

OSVDB: 4305

Secunia: 11136