Ipswitch WS_FTP Server prior 4.0.0 file REST argument Denial Of Service 1.1
 
Plugin ID126
Plugin nameIpswitch WS_FTP Server prior 4.0.0 file REST argument Denial Of Service
Plugin filenameIpswitch WS_FTP Server prior 4.0.0 file REST argument Denial Of Service.plugin
Plugin filesize3098 bytes
Plugin familyFTP
Plugin created nameMarc Ruef
Plugin created emailmarc dot ruef at computec dot ch
Plugin created webhttp://www.computec.ch
Plugin created companycomputec.ch
Plugin created date2004/09/02
Plugin updated nameMarc Ruef
Plugin updated emailmarc dot ruef at computec dot ch
Plugin updated webhttp://www.computec.ch
Plugin updated companycomputec.ch
Plugin updated date2004/11/13
Plugin version1.1
Plugin changelogCorrected the plugin structure and added the accuracy values in 1.1
Plugin protocoltcp
Plugin port21
Plugin procedure detectionopen|sleep|close|pattern_exists *WS_FTP Server [0-3].* OR *WS_FTP Server 4.0*
Plugin detection accuracy80
Plugin commentThis plugin was inspired by the Nessus plugin.
Bug affectedIpswitch WS_FTP Server prior 4.0.0
Bug not affectedIpswitch WS_FTP Server newer than 4.0.0 or other ftp servers
Bug vulnerability classDenial Of Service
Bug descriptionThe Ipswitch WS_FTP Server is a well-known ftp server for Windows operating systems. A remote or local attacker can create a specially crafted file with a large REST argument. This may crash the server and cause a denial of service.
Bug solutionIf the ftp server is not used it should be de-installed or de-activated. Install the newest patch or bugfix to solve the problem or upgrade to the latest software version which is not vulnerable anymore (http://www.ipswitch.com/Products/WS_FTP-Server/). Additionally limit unwanted connections and communications with firewalling. Just let serious user access your ftp server.
Bug fixing timeApprox. 20 minutes
Bug exploit availabilityMaybe
Bug exploit urlhttp://www.securityfocus.com/bid/9953/exploit/
Bug remoteYes
Bug localYes
Bug severityMedium
Bug popularity7
Bug simplicity6
Bug impact7
Bug risk6
Bug Nessus riskHigh
Bug check toolsNessus is able to do a similar check
Source SecurityFocus BID9953
Source Nessus ID14598
Source LiteratureHacking Exposed: Network Security Secrets & Solutions, Stuart McClure, Joel Scambray and George Kurtz, February 25, 2003, 4th Edition, McGraw-Hill Osborne Media, ISBN 0072227427
Source Misc.http://www.computec.ch

This file was generated by the Attack Tool Kit (ATK), the open-sourced security scanner and exploiting framework.