Ipswitch WS_FTP Server prior 4.0.0 ALLO handler buffer overflow 1.1
 
Plugin ID124
Plugin nameIpswitch WS_FTP Server prior 4.0.0 ALLO handler buffer overflow
Plugin filenameIpswitch WS_FTP Server prior 4.0.0 ALLO handler buffer overflow.plugin
Plugin filesize3057 bytes
Plugin familyFTP
Plugin created nameMarc Ruef
Plugin created emailmarc dot ruef at computec dot ch
Plugin created webhttp://www.computec.ch
Plugin created companycomputec.ch
Plugin created date2004/09/02
Plugin updated nameMarc Ruef
Plugin updated emailmarc dot ruef at computec dot ch
Plugin updated webhttp://www.computec.ch
Plugin updated companycomputec.ch
Plugin updated date2004/11/13
Plugin version1.1
Plugin changelogCorrected the plugin structure and added the accuracy values in 1.1
Plugin protocoltcp
Plugin port21
Plugin procedure detectionopen|sleep|close|pattern_exists *WS_FTP Server [0-3].* OR *WS_FTP Server 4.0*
Plugin detection accuracy80
Plugin commentThis plugin was inspired by the Nessus plugin.
Bug affectedIpswitch WS_FTP Server prior 4.0.0
Bug not affectedIpswitch WS_FTP Server newer than 4.0.0 or other ftp servers
Bug vulnerability classBuffer Overflow
Bug descriptionThe Ipswitch WS_FTP Server is a well-known ftp server for Windows operating systems. There was a vulnerability in the ALLO handler which may allow to run arbitrary code. An attacker may gain elevated privileges.
Bug solutionIf the ftp server is not used it should be de-installed or de-activated. Install the newest patch or bugfix to solve the problem or upgrade to the latest software version which is not vulnerable anymore (http://www.ipswitch.com/Products/WS_FTP-Server/). Additionally limit unwanted connections and communications with firewalling and do not allow passive FTP connections.
Bug fixing timeApprox. 20 minutes
Bug exploit availabilityNo
Bug exploit urlhttp://www.securityfocus.com/bid/9953/exploit/
Bug remoteYes
Bug localYes
Bug severityHigh
Bug popularity7
Bug simplicity6
Bug impact9
Bug risk7
Bug Nessus riskHigh
Bug check toolsNessus is able to do a similar check
Source SecurityFocus BID9953
Source Nessus ID14598
Source LiteratureHacking Exposed: Network Security Secrets & Solutions, Stuart McClure, Joel Scambray and George Kurtz, February 25, 2003, 4th Edition, McGraw-Hill Osborne Media, ISBN 0072227427
Source Misc.http://www.computec.ch

This file was generated by the Attack Tool Kit (ATK), the open-sourced security scanner and exploiting framework.