Overview
An input validation error in the Microsoft Windows FTP Client may allow a remote attacker to write files to arbitrary locations and may allow the execution of arbitrary code.
Description
The Microsoft Windows FTP Client does not properly validate the names of received files. If a remote attacker can persuade a user to download a file with a specially crafted name using the Windows FTP Client, that attacker may be able to write that file to an arbitrary location on the users system. In order to exploit this vulnerability, the crafted file name must map to an existing location on the user's system. Note that this vulnerability may allow a remote attacker to execute arbitrary code. For instance, an attacker may be able to leverage this vulnerability to download an arbitrary file to the Startup folder. If the downloaded file is executable, then that file will be executed the next time a user logs in. |
Impact
A remote attacker may be able to write files to arbitrary locations on a vulnerable system. If the target location is the Startup folder, then it is possible to cause arbitrary code to be automatically executed the next time the user logs in. |
Solution
Apply a patch Microsoft has addressed this issue in Microsoft Security Bulletin MS05-044 |
Do not download files from untrusted sources
|
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
Acknowledgements
This vulnerability was reported by Microsoft in MS05-044.
This document was written by Jeff Gennari.
Other Information
CVE IDs: | CVE-2005-2126 |
Severity Metric: | 16.20 |
Date Public: | 2005-10-11 |
Date First Published: | 2005-10-13 |
Date Last Updated: | 2005-10-14 12:44 UTC |
Document Revision: | 42 |