WS_FTP Pro HTTP Server Response Format String

High Nessus Plugin ID 44046


The remote Windows host contains a program that is prone to a remote format string attack.


The remote Windows host contains a version of Ipswitch's WS_FTP Professional that is earlier than 12.2. Such versions are prone to a format-string vulnerability because they fail to properly sanitize user-supplied input before passing it as the format specifier to a formatted-printing function.

If an attacker can trick a user into connecting to a malicious web server using the affected application, this issue could be exploited to execute arbitrary code subject to the user's privileges.


Upgrade to WS_FTP Pro for Windows version 12.2 or later.

See Also

Plugin Details

Severity: High

ID: 44046

File Name: wsftppro_122.nasl

Version: $Revision: 1.9 $

Type: local

Agent: windows

Family: Windows

Published: 2010/01/18

Modified: 2015/01/12

Dependencies: 13855

Risk Information

Risk Factor: High


Base Score: 9.3

Temporal Score: 7.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:POC/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:ipswitch:ws_ftp

Required KB Items: SMB/Registry/Enumerated

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2009/11/10

Vulnerability Publication Date: 2009/09/09

Reference Information

CVE: CVE-2009-4775

BID: 36297

OSVDB: 64036