WFTPD APPE Command Buffer Overflow

medium Nessus Plugin ID 24671


The remote FTP server is affected by a buffer overflow vulnerability.


The remote host appears to be using WFTPD, an FTP server for Windows.

The version of WFTPD installed on the remote host contains a stack- based buffer overflow vulnerability that can be exploited by an authenticated, possibly anonymous, user with a specially crafted APPE command to crash the affected application or execute arbitrary code on the affected host.


Unknown at this time.

See Also

Plugin Details

Severity: Medium

ID: 24671

File Name: wftpd_appe_overflow.nasl

Version: 1.20

Type: remote

Family: FTP

Published: 2/19/2007

Updated: 11/15/2018

Risk Information


Risk Factor: Medium

Score: 6.6


Risk Factor: Medium

Base Score: 5.8

Temporal Score: 4.5

Vector: CVSS2#AV:N/AC:L/Au:M/C:P/I:P/A:P

Vulnerability Information

Required KB Items: ftp/login, ftp/password

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 11/8/2006

Reference Information

CVE: CVE-2006-5826

BID: 20942