search menu icon-carat-right cmu-wordmark

CERT Coordination Center

WS_FTP Server vulnerable to buffer overflow when supplied overly long "STAT" command

Vulnerability Note VU#219140

Original Release Date: 2003-09-22 | Last Revised: 2003-09-22

Overview

It has been reported that a vulnerability exists in the processing of a "STAT" command on WS_FTP Servers versions 4.x and prior. Exploitation of this vulnerability may lead to an authenticated user executing arbitrary code with the elevated privileges of the server process.

Description

WS_FTP Server is a File Transfer Protocol server. A buffer overflow vulnerability has been reported in code that processes the "STAT" command (status). WS_FTP Servers versions 3.00, 4.00, 4.01 are vulnerable to this issue.

Impact

Access the server is required prior to exploitation of this vulnerability. Exploitation of this vulnerability may lead to an authenticated user executing arbitrary code with the elevated privileges of the server process. If the server is setup to permit anonymous access, then authentication is not a requirement for exploitation.

Solution

A patch was released for WS_FTP server 3.0 and is resolved in version 3.14.

ftp://ftp.ipswitch.com/ipswitch/product_support/WS_FTP_Server/ifs314.exe

A patch was released for WS_FTP server 4.00 and 4.01 and is resolved in version 4.02.

ftp://ftp.ipswitch.com/ipswitch/product_support/ws_ftp_server/ifs402.exe

Disable anonymous FTP access

Although disabling anonymous FTP access does not prevent attacks from occurring, it does prevent unauthenticated users from attempting to exploit the vulnerability.

Vendor Information

219140
 

IPSWITCH Affected

Updated:  September 22, 2003

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.


CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

Thanks to Secunia Security Advisories for reporting this vulnerability.

This document was written by Jason A Rafail.

Other Information

CVE IDs: None
Severity Metric: 10.50
Date Public: 2003-09-04
Date First Published: 2003-09-22
Date Last Updated: 2003-09-22 14:30 UTC
Document Revision: 5

Sponsored by CISA.