Plugin ID | 114 |
Plugin name | Ipswitch WS_FTP Server prior 5.0.2 CWD path denial of service |
Plugin filename | Ipswitch WS_FTP Server prior 5.0.2 CWD path denial of service.plugin |
Plugin filesize | 3836 bytes |
Plugin family | FTP |
Plugin created name | Marc Ruef |
Plugin created email | marc dot ruef at computec dot ch |
Plugin created web | http://www.computec.ch |
Plugin created company | computec.ch |
Plugin created date | 2004/09/01 |
Plugin updated name | Marc Ruef |
Plugin updated email | marc dot ruef at computec dot ch |
Plugin updated web | http://www.computec.ch |
Plugin updated company | computec.ch |
Plugin updated date | 2004/11/13 |
Plugin version | 1.2 |
Plugin changelog | Corrected the plugin structure and added the accuracy values in 1.2 |
Plugin protocol | tcp |
Plugin port | 21 |
Plugin procedure detection | open|sleep|close|pattern_exists *WS_FTP Server [0-4].* OR *WS_FTP Server 5.0.[0-2]* |
Plugin procedure exploit | open|sleep|send USER ftp\n|sleep|send PASS test@localhost\n|sleep|send cd a../a\n|sleep|close|pattern_exists * |
Plugin detection accuracy | 80 |
Plugin exploit accuracy | 98 |
Plugin comment | This plugin was written with the ATK Attack Editor. |
Bug published name | lion |
Bug published email | lion at cnhonker dot net |
Bug published web | http://www.cnhonker.com |
Bug published date | 2004/08/30 |
Bug advisory | http://packetstormsecurity.org/0408-advisories/wsFTP-DoS.txt |
Bug affected | Ipswitch WS_FTP Server prior 5.0.2 |
Bug not affected | Ipswitch WS_FTP Server newer than 5.0.2 or other ftp servers |
Bug vulnerability class | Denial Of Service |
Bug description | The Ipswitch WS_FTP Server is a well-known ftp server for Windows operating systems. lion published a denial of service vulnerability in the version prior 5.0.2. So it is possible to increase the CPU usage of the server with the wrong path command "cd a../a". An user account is required to exploit this flaw. |
Bug solution | If the ftp server is not used it should be de-installed or de-activated. Install the newest patch or bugfix to solve the problem or upgrade to the latest software version which is not vulnerable anymore (http://www.ipswitch.com/Products/WS_FTP-Server/). Additionally limit unwanted connections and communications with firewalling. |
Bug fixing time | Approx. 20 minutes |
Bug exploit availability | Yes |
Bug exploit url | http://packetstormsecurity.org/0408-advisories/wsFTP-DoS.txt |
Bug remote | Yes |
Bug local | Yes |
Bug severity | Medium |
Bug popularity | 7 |
Bug simplicity | 8 |
Bug impact | 7 |
Bug risk | 7 |
Bug check tools | The Attack Tool Kit provides an exploit and an detection plugin. |
Source CVE | CVE-1999-0362 |
Source SecurityFocus BID | 217 |
Source OSVDB ID | 937 |
Source Secunia ID | 12406 |
Source scipID | 814 |
Source Nessus ID | 14586 |
Source Literature | Hacking Exposed: Network Security Secrets & Solutions, Stuart McClure, Joel Scambray and George Kurtz, February 25, 2003, 4th Edition, McGraw-Hill Osborne Media, ISBN 0072227427 |
Source Misc. | http://www.computec.ch |