Ipswitch WS_FTP Server prior 5.0.2 CWD path denial of service 1.2
 
Plugin ID114
Plugin nameIpswitch WS_FTP Server prior 5.0.2 CWD path denial of service
Plugin filenameIpswitch WS_FTP Server prior 5.0.2 CWD path denial of service.plugin
Plugin filesize3836 bytes
Plugin familyFTP
Plugin created nameMarc Ruef
Plugin created emailmarc dot ruef at computec dot ch
Plugin created webhttp://www.computec.ch
Plugin created companycomputec.ch
Plugin created date2004/09/01
Plugin updated nameMarc Ruef
Plugin updated emailmarc dot ruef at computec dot ch
Plugin updated webhttp://www.computec.ch
Plugin updated companycomputec.ch
Plugin updated date2004/11/13
Plugin version1.2
Plugin changelogCorrected the plugin structure and added the accuracy values in 1.2
Plugin protocoltcp
Plugin port21
Plugin procedure detectionopen|sleep|close|pattern_exists *WS_FTP Server [0-4].* OR *WS_FTP Server 5.0.[0-2]*
Plugin procedure exploitopen|sleep|send USER ftp\n|sleep|send PASS test@localhost\n|sleep|send cd a../a\n|sleep|close|pattern_exists *
Plugin detection accuracy80
Plugin exploit accuracy98
Plugin commentThis plugin was written with the ATK Attack Editor.
Bug published namelion
Bug published emaillion at cnhonker dot net
Bug published webhttp://www.cnhonker.com
Bug published date2004/08/30
Bug advisoryhttp://packetstormsecurity.org/0408-advisories/wsFTP-DoS.txt
Bug affectedIpswitch WS_FTP Server prior 5.0.2
Bug not affectedIpswitch WS_FTP Server newer than 5.0.2 or other ftp servers
Bug vulnerability classDenial Of Service
Bug descriptionThe Ipswitch WS_FTP Server is a well-known ftp server for Windows operating systems. lion published a denial of service vulnerability in the version prior 5.0.2. So it is possible to increase the CPU usage of the server with the wrong path command "cd a../a". An user account is required to exploit this flaw.
Bug solutionIf the ftp server is not used it should be de-installed or de-activated. Install the newest patch or bugfix to solve the problem or upgrade to the latest software version which is not vulnerable anymore (http://www.ipswitch.com/Products/WS_FTP-Server/). Additionally limit unwanted connections and communications with firewalling.
Bug fixing timeApprox. 20 minutes
Bug exploit availabilityYes
Bug exploit urlhttp://packetstormsecurity.org/0408-advisories/wsFTP-DoS.txt
Bug remoteYes
Bug localYes
Bug severityMedium
Bug popularity7
Bug simplicity8
Bug impact7
Bug risk7
Bug check toolsThe Attack Tool Kit provides an exploit and an detection plugin.
Source CVECVE-1999-0362
Source SecurityFocus BID217
Source OSVDB ID937
Source Secunia ID12406
Source scipID814
Source Nessus ID14586
Source LiteratureHacking Exposed: Network Security Secrets & Solutions, Stuart McClure, Joel Scambray and George Kurtz, February 25, 2003, 4th Edition, McGraw-Hill Osborne Media, ISBN 0072227427
Source Misc.http://www.computec.ch

This file was generated by the Attack Tool Kit (ATK), the open-sourced security scanner and exploiting framework.