WS_FTP Server prior 5.0.3 multiple flaws 1.0
 
Plugin ID328
Plugin nameWS_FTP Server prior 5.0.3 multiple flaws
Plugin filenameWS_FTP Server prior 5.0.3 multiple flaws.plugin
Plugin filesize2215 bytes
Plugin familyFTP
Plugin created nameMarc Ruef
Plugin created emailmarc.ruef at computec.ch
Plugin created webhttp://www.computec.ch
Plugin created companycomputec.ch
Plugin created date2005/01/09
Plugin version1.0
Plugin protocolunknown
Plugin port21
Plugin procedure detectionopen|sleep|close|pattern_exists *WS_FTP Server [0-4].* OR *WS_FTP Server 5.0.[0-3]*
Plugin detection accuracy80
Plugin commentThe NASL script is Copyright (C) 2004 Tenable Network Security
Bug affectedWS_FTP Server prior 5.0.3
Bug vulnerability classUnknown
Bug descriptionAccording to its version number, the remote WS_FTP server is vulnerable to multiple buffer overflows which may be used by an attacker to execute arbitary code on the remote system.
Bug solutionUpgrade to the latest version of this software.
Bug fixing timeApprox. 30 minutes
Bug exploit availabilityMaybe
Bug exploit urlhttp://www.securityfocus.com/bid/11772/exploit/
Bug remoteYes
Bug localYes
Bug severityHigh
Bug popularity7
Bug simplicity6
Bug impact8
Bug risk7
Bug Nessus riskHigh
Bug check toolsNessus can check this flaw with the plugin 15857 (WS FTP server multiple flaws (2)).
Source SecurityFocus BID11772
Source Nessus ID15857
Source LiteratureHacking Exposed: Network Security Secrets & Solutions, Stuart McClure, Joel Scambray and George Kurtz, February 25, 2003, 4th Edition, McGraw-Hill Osborne Media, ISBN 0072227427
Source Misc.http://www.computec.ch

This file was generated by the Attack Tool Kit (ATK), the open-sourced security scanner and exploiting framework.