| CVE ID | CVE-2006-5000 | 
| CVSS SCORE | |
| AFFECTED VENDORS | Ipswitch | 
| AFFECTED PRODUCTS | WS_FTP | 
| TREND MICRO CUSTOMER PROTECTION | Trend Micro TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID ['4705']. For further product information on the TippingPoint IPS: http://www.tippingpoint.com | 
| VULNERABILITY DETAILS | This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Ipswitch WS_FTP Server. Anonymous access or authentication is required to exploit this vulnerability. The specific flaw exists due to a lack of bounds checking during the parsing of long string arguments to the 'XCRC', 'XSHA1' and 'XMD5' commands leading to a stack overflow vulnerability. Exploitation requires valid or anonymous FTP server credentials. | 
| ADDITIONAL DETAILS | Ipswitch has issued an update to correct this vulnerability. More details can be found at: http://www.ipswitch.com/support/ws_ftp-server/releases/wr505hf1.asp | 
| DISCLOSURE TIMELINE | 
 | 
| CREDIT | Anonymous |