Ipswitch WS_FTP Server prior 3.0.1 FTP bounce detection 1.1
 
Plugin ID122
Plugin nameIpswitch WS_FTP Server prior 3.0.1 FTP bounce detection
Plugin filenameIpswitch WS_FTP Server prior 3.0.1 FTP bounce detection.plugin
Plugin filesize2980 bytes
Plugin familyFTP
Plugin created nameMarc Ruef
Plugin created emailmarc dot ruef at computec dot ch
Plugin created webhttp://www.computec.ch
Plugin created companycomputec.ch
Plugin created date2004/09/02
Plugin updated nameMarc Ruef
Plugin updated emailmarc dot ruef at computec dot ch
Plugin updated webhttp://www.computec.ch
Plugin updated companycomputec.ch
Plugin updated date2004/11/13
Plugin version1.1
Plugin changelogCorrected the plugin structure and added the accuracy values in 1.1
Plugin protocoltcp
Plugin port21
Plugin procedure detectionopen|sleep|close|pattern_exists *WS_FTP Server [0-2].* OR *WS_FTP Server 3.0.[0-1]*
Plugin detection accuracy80
Plugin commentThis plugin was inspired by the Nessus plugin.
Bug affectedIpswitch WS_FTP Server prior 3.0.1
Bug not affectedIpswitch WS_FTP Server newer than 3.0.1 or other ftp servers
Bug vulnerability classConfiguration
Bug descriptionThe Ipswitch WS_FTP Server is a well-known ftp server for Windows operating systems. There was a FTP bounce vulnerability, exploitable by a specially crafted FTP command, found.
Bug solutionIf the ftp server is not used it should be de-installed or de-activated. Install the newest patch or bugfix to solve the problem or upgrade to the latest software version which is not vulnerable anymore (http://www.ipswitch.com/Products/WS_FTP-Server/). Additionally limit unwanted connections and communications with firewalling.
Bug fixing timeApprox. 20 minutes
Bug exploit availabilityNo
Bug exploit urlhttp://www.securityfocus.com/bid/6050/exploit/
Bug remoteYes
Bug localYes
Bug severityMedium
Bug popularity7
Bug simplicity8
Bug impact5
Bug risk6
Bug Nessus riskHigh
Bug check toolsNessus is able to do a similar check
Source SecurityFocus BID6050
Source Nessus ID14599
Source LiteratureHacking Exposed: Network Security Secrets & Solutions, Stuart McClure, Joel Scambray and George Kurtz, February 25, 2003, 4th Edition, McGraw-Hill Osborne Media, ISBN 0072227427
Source Misc.http://www.computec.ch

This file was generated by the Attack Tool Kit (ATK), the open-sourced security scanner and exploiting framework.